Next Article in Journal
Advancing Link Prediction with a Hybrid Graph Neural Network Approach
Previous Article in Journal
A General Dynamic Modeling Method for Disk–Drum–Shaft Coupled Structure Considering Structural Differences and Bolt Non-Uniform Connection Effect
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Breaking Enhanced CBC and Its Application

1
Department of Cryptology Science and Technology, Beijing Electronic Science and Technology Institute, Beijing 100070, China
2
School of Cryptology, University of Chinese Academy of Sciences, Beijing 100049, China
3
State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
4
School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
5
National Key Laboratory of Security Communication, Chengdu 610041, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(22), 3595; https://doi.org/10.3390/math13223595 (registering DOI)
Submission received: 4 October 2025 / Revised: 6 November 2025 / Accepted: 7 November 2025 / Published: 9 November 2025
(This article belongs to the Section E1: Mathematics and Computer Science)

Abstract

The Enhanced Cipher Block Chaining scheme (eCBC) is an authentication encryption scheme (AE) improved from the CBC encryption scheme. It is shown that eCBC scheme fails to achieve ciphertext integrity (INT-CTXT): the IV is unauthenticated and the tag is a linear XOR of ciphertext hashes, enabling trivial forgeries such as IV substitution, block cancellation, and permutation. Furthermore, the medical image application diagonal block encryption based on eCBC scheme is also insecure. Its deterministic design leaks structural information, breaking confidentiality (IND-CPA). At the same time, it also inherits the forgery weaknesses of eCBC scheme, breaking authenticity. The results highlight that neither eCBC scheme nor its application meet AE security goals. And it is recommended to use standardized AE schemes such as SIV, GCM, or Ascon instead of ad hoc designs.
Keywords: authenticated encryption; IND-CPA; INT-CTXT; eCBC authenticated encryption; IND-CPA; INT-CTXT; eCBC

Share and Cite

MDPI and ACS Style

Mao, S.; Wang, P.; Jia, Y.; Liu, G.; Chen, Y. Breaking Enhanced CBC and Its Application. Mathematics 2025, 13, 3595. https://doi.org/10.3390/math13223595

AMA Style

Mao S, Wang P, Jia Y, Liu G, Chen Y. Breaking Enhanced CBC and Its Application. Mathematics. 2025; 13(22):3595. https://doi.org/10.3390/math13223595

Chicago/Turabian Style

Mao, Shuping, Peng Wang, Yan Jia, Gang Liu, and Ying Chen. 2025. "Breaking Enhanced CBC and Its Application" Mathematics 13, no. 22: 3595. https://doi.org/10.3390/math13223595

APA Style

Mao, S., Wang, P., Jia, Y., Liu, G., & Chen, Y. (2025). Breaking Enhanced CBC and Its Application. Mathematics, 13(22), 3595. https://doi.org/10.3390/math13223595

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop