Paper 2024/1554

Breaking the IEEE Encryption Standard – XCB-AES in Two Queries

Amit Singh Bhati, COSIC, KU Leuven, Belgium, 3MI Labs, Belgium
Elena Andreeva, TU Wien, Austria
Abstract

Tweakable enciphering modes (TEMs) provide security in various storage and space-critical applications, including disk and file-based encryption and packet-based communication protocols. XCB-AES (originally introduced as XCBv2) is specified in the IEEE 1619.2 standard for encryption of sector-oriented storage media and comes with a formal security proof for block-aligned messages. In this work, we present the first plaintext recovery attack on XCB-AES $-$ the shared difference attack, demonstrating that the security of XCB-AES is fundamentally flawed. Our plaintext recovery attack is highly efficient and requires only two queries (one enciphering and one deciphering), breaking the claimed $\mathsf{vil\text{-}stprp}$, $\mathsf{stprp}$ as well as the basic $\mathsf{sprp}$ security. Our shared difference attack exploits an inherent property of polynomial hash functions called separability. We pinpoint the exact flaw in the security proof of XCB-AES, which arises from the separability of polynomial hash functions. We show that this vulnerability in the XCB design strategy has gone unnoticed for over 20 years and has been inadvertently replicated in many XCB-style TEM designs, including the IEEE 1619.2 standard XCB-AES. We also apply the shared difference attack to other TEMs based on XCB $-$ XCBv1, HCI, and MXCB, invalidating all of their security claims, and discuss some immediate countermeasures. Our findings are the first to highlight the need to reassess the present IEEE 1619.2 standard as well as the security and potential deployments of XCB-style TEMs.

Note: This is CRYPTO 2025 version of the paper that focuses solely on our surprising attacks against XCB-style TEMs. GEM (the beyond-birthday-bound secure alternative to XCB) is separated and planned for another ePrint as a standalone paper.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published by the IACR in CRYPTO 2025
Keywords
Tweakable encipheringdisk-sector encryptionIEEE 1619.2VIL-STPRPXCBv1XCB-AESHCIshared difference attack
Contact author(s)
amitsingh bhati @ 3milabs tech
elena andreeva @ tuwien ac at
History
2025-06-12: last of 4 revisions
2024-10-03: received
See all versions
Short URL
https://ia.cr/2024/1554
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1554,
      author = {Amit Singh Bhati and Elena Andreeva},
      title = {Breaking the {IEEE} Encryption Standard – {XCB}-{AES} in Two Queries},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1554},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1554}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.