<div class="csl-bib-body">
<div class="csl-entry">Bhati, A. S., & Andreeva, E. (2025). Breaking the IEEE Encryption Standard XCB-AES in Two Queries. In Y. T. Kalai & S. F. Kamara (Eds.), <i>Advances in Cryptology – CRYPTO 2025 : 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part VI</i> (pp. 172–199). Springer. https://doi.org/10.1007/978-3-032-01901-1_6</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/222789
-
dc.description.abstract
Tweakable enciphering modes (TEMs) provide security in various storage and space-critical applications, including disk and file-based encryption and packet-based communication protocols. XCB-AES (originally introduced as XCBv2) is specified in the IEEE 1619.2 standard for encryption of sector-oriented storage media and comes with a formal security proof for block-aligned messages. In this work, we present the first plaintext recovery attack on XCB-AES – the shared difference attack, demonstrating that the security of XCB-AES is fundamentally flawed. Our plaintext recovery attack is highly efficient and requires only two queries (one enciphering and one deciphering), breaking the claimed vil-stprp, stprp as well as the basic sprp security. Our shared difference attack exploits an inherent property of polynomial hash functions called separability. We pinpoint the exact flaw in the security proof of XCB-AES, which arises from the separability of polynomial hash functions. We show that this vulnerability in the XCB design strategy has gone unnoticed for over 20 years and has been inadvertently replicated in many XCB-style TEM designs, including the IEEE 1619.2 standard XCB-AES. We also apply the shared difference attack to other TEMs based on XCB – XCBv1, HCI, and MXCB, invalidating all of their security claims, and discuss some immediate countermeasures. Our findings are the first to highlight the need to reassess the present IEEE 1619.2 standard as well as the security and potential deployments of XCB-style TEMs (Our attack was completed and under review since February, 2024. We later responsibly communicated it to IEEE and the authors of XCB [20, 37]. The authors of XCBv2fb [20] confirmed the validity of our attack on 02/09/2024.)
en
dc.description.sponsorship
FWF - Österr. Wissenschaftsfonds
-
dc.language.iso
en
-
dc.relation.ispartofseries
Lecture Notes in Computer Science
-
dc.subject
disk-sector encryption
en
dc.subject
HCI
en
dc.subject
IEEE 1619.2
en
dc.subject
shared difference attack
en
dc.subject
Tweakable enciphering mode
en
dc.subject
VIL-STPRP
en
dc.subject
XCB-AES
en
dc.subject
XCBv1
en
dc.title
Breaking the IEEE Encryption Standard XCB-AES in Two Queries
en
dc.type
Inproceedings
en
dc.type
Konferenzbeitrag
de
dc.contributor.affiliation
KU Leuven, Belgium
-
dc.contributor.editoraffiliation
Massachusetts Institute of Technology, United States of America (the)
-
dc.contributor.editoraffiliation
MongoDB (United States), United States of America (the)
-
dc.relation.isbn
978-3-032-01887-8
-
dc.relation.doi
10.1007/978-3-032-01887-8
-
dc.relation.issn
0302-9743
-
dc.description.startpage
172
-
dc.description.endpage
199
-
dc.relation.grantno
F 8500
-
dc.type.category
Full-Paper Contribution
-
dc.relation.eissn
1611-3349
-
tuw.booktitle
Advances in Cryptology – CRYPTO 2025 : 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part VI
-
tuw.container.volume
16005
-
tuw.peerreviewed
true
-
tuw.relation.publisher
Springer
-
tuw.relation.publisherplace
Cham
-
tuw.project.title
Semantische und kryptografische Grundlagen von Informationssicherheit und Datenschutz durch modulares Design
-
tuw.researchTopic.id
I1
-
tuw.researchTopic.name
Logic and Computation
-
tuw.researchTopic.value
100
-
tuw.publication.orgunit
E192-06 - Forschungsbereich Security and Privacy
-
tuw.publisher.doi
10.1007/978-3-032-01901-1_6
-
dc.description.numberOfPages
28
-
tuw.author.orcid
0000-0003-0843-4885
-
tuw.author.orcid
0000-0003-0964-8711
-
tuw.event.name
45th Annual International Cryptology Conference (CRYPTO 2025)