Extra: Authenticated Encryption CBC-XOR
Problem
Show two types of forgery attacks for authenticated encryption scheme CBC-XOR.
Solution
Method 1 - Truncation
Query and obtain the ciphertext .
Thus should be a valid ciphertext for
Method 2 - Swap
Query and obtain the ciphertext
Thus
Hence should be a valid tag for , where
Last updated
Was this helpful?