Next Article in Journal
Advancing Link Prediction with a Hybrid Graph Neural Network Approach
Previous Article in Journal
A General Dynamic Modeling Method for Disk–Drum–Shaft Coupled Structure Considering Structural Differences and Bolt Non-Uniform Connection Effect
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Breaking Enhanced CBC and Its Application

1
Department of Cryptology Science and Technology, Beijing Electronic Science and Technology Institute, Beijing 100070, China
2
School of Cryptology, University of Chinese Academy of Sciences, Beijing 100049, China
3
State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
4
School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
5
National Key Laboratory of Security Communication, Chengdu 610041, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(22), 3595; https://doi.org/10.3390/math13223595
Submission received: 4 October 2025 / Revised: 6 November 2025 / Accepted: 7 November 2025 / Published: 9 November 2025
(This article belongs to the Section E1: Mathematics and Computer Science)

Abstract

The Enhanced Cipher Block Chaining scheme (eCBC) is an authentication encryption scheme (AE) improved from the CBC encryption scheme. It is shown that eCBC scheme fails to achieve ciphertext integrity (INT-CTXT): the IV is unauthenticated and the tag is a linear XOR of ciphertext hashes, enabling trivial forgeries such as IV substitution, block cancellation, and permutation. Furthermore, the medical image application diagonal block encryption based on eCBC scheme is also insecure. Its deterministic design leaks structural information, breaking confidentiality (IND-CPA). At the same time, it also inherits the forgery weaknesses of eCBC scheme, breaking authenticity. The results highlight that neither eCBC scheme nor its application meet AE security goals. And it is recommended to use standardized AE schemes such as SIV, GCM, or Ascon instead of ad hoc designs.
MSC:
94A60

1. Introduction

Authenticated encryption (AE) [1,2] is a standard primitive in symmetric-key cryptography, simultaneously ensuring confidentiality and authenticity. The security of AE is typically formalized by indistinguishability under chosen-plaintext attack (IND-CPA) for confidentiality and integrity of ciphertexts (INT-CTXT) for authenticity. At present, well-studied and standardized AE schemes include GCM (Galois/Counter Mode) [3], CCM (Counter with CBC-MAC) [4], OCB (Offset Codebook Mode) [5], SIV (Synthetic IV) [6], etc. In addition, there are also some excellent lightweight AE algorithms emerging from the NIST LWC standardization process such as Ascon [7].
The Cipher Block Chaining (CBC) scheme [8] is a widely used encryption scheme. In the CBC scheme, each plaintext block is first XORed with the previous ciphertext block and then encrypted by a block cipher. As a result, every ciphertext block depends on all preceding plaintext blocks. To ensure the randomness of the ciphertext, a random Initialization Vector (IV) is required for the first block.
Enhanced Cipher Block Chaining (eCBC) was proposed by Alslman et al. [9] as a modification of the classical CBC mode of operation. The primary design goal was to strengthen CBC, which by itself only provides confidentiality and is vulnerable to bit-flipping and malleability attacks. To address this, the eCBC scheme changes the chaining process: before encryption, it adds a keyed hash from the previous ciphertext block. It also produces an authentication tag, generated by XOR-ing keyed hashes of all ciphertext blocks. Although the authors claim that the eCBC scheme improves authenticity and integrity, they did not provide a formal security proof for standard notions such as IND-CPA or INT-CTXT.
Subsequently, Alsaraireh [10] applied eCBC scheme to the protection of medical images. Their approach divides an image into diagonal and non-diagonal sub-blocks. Diagonal blocks are encrypted using eCBC scheme to provide confidentiality and claimed authenticity. Non-diagonal blocks are processed deterministically through inter-block differences and XOR substitution in order to reduce computational cost. This design aimed to balance security and efficiency for IoT-based healthcare systems, which must secure large images under resource constraints. However, as will be shown, both the scheme and this application fail to meet standard security definitions.
The main results in the paper are as follows:
1.
The construction of concrete and efficient INT-CTXT forgeries against the eCBC scheme is presented. The scheme is vulnerable due to two critical design flaws: first, the IV is excluded from the tag, allowing an adversary to forge ciphertexts by substituting any IV. Second, because the tag is a linear XOR of keyed ciphertext hashes, it is invariant to block permutations and even-numbered duplications. These attacks demonstrate that eCBC offers no effective authenticity guarantees.
2.
The analysis of eCBC-based medical image scheme shows it fails IND-CPA security. Its non-diagonal blocks are processed deterministically without randomness, causing identical plaintext blocks to produce identical ciphertexts. This leaks structural information and allows adversaries to detect content repetition, thereby contradicting the fundamental requirement that ciphertexts must be indistinguishable.
3.
We conclude that eCBC and its medical image application fail to achieve standard AE security. While empirical evaluations (e.g., of image histograms, entropy, and NPCR/UACI) may suggest robustness, these are insufficient to ensure cryptographic security. As shown, adversaries can successfully perform forgery and distinguishing attacks, violating both authenticity and confidentiality guarantees.

2. Preliminaries

2.1. Notation

Block Cipher. A block cipher E : { 0 , 1 } k × { 0 , 1 } n { 0 , 1 } n is a map with key space { 0 , 1 } k and message space { 0 , 1 } n such that for every key K { 0 , 1 } k , E ( K , · ) is a permutation of { 0 , 1 } n . The inverse E is denoted by D such that D ( K , · ) is the inverse of E ( K , · ) . We write E ( K , M ) ( D ( K , C ) ) as E K ( M ) ( D K ( C ) ) and sometimes omit K for convenience.
Authenticated Encryption. An authenticated encryption (AE) scheme is a pair of algorithms Π = ( Enc , Dec ) where Enc : Key × AD × Plaintext Ciphertext is usually a randomized algorithm and Dec : Key × AD × Ciphertext Plaintext { } is a deterministic algorithm, with key space Key , associated date space AD , plaintext space Plaintext , and ciphertext space Ciphertext . Note that here, ⊥ denotes a decryption failure The encryption and decryption can be written as follows.
( C , T ) $ Enc K ( A , P ) , P / Dec K ( A , C ) .

2.2. Security Definitions

IND-CPA (Indistinguishability under Chosen-Plaintext Attack). IND-CPA requires ciphertext indistinguishability under chosen-plaintext queries. This notion captures the confidentiality of an encryption scheme. It requires that an adversary, even with the ability to request encryptions of arbitrary plaintexts of its choice, cannot distinguish between the encryptions of two chosen messages of equal length. Intuitively, this means that ciphertexts reveal no information about the underlying plaintexts beyond their length.
Definition 1
(IND-CPA). For an AE scheme  Π = ( Enc , Dec )  the IND-CPA security is defined by the following game between a challenger and an adversary  A :
  • Key Generation: The challenger picks a random key K and a random bit b.
  • Queries:  A  is allowed to make two types of queries:
    • Challenge Queries:  A  sends two different tuples ( A 0 , P 0 )  and  ( A 1 , P 1 ) to the challenger. The challenger responds with  C = Enc K A b , P b .
    • Encryption Queries: For each such query of  ( A , P ) , the challenger responds with  Enc K ( I V , A , P ) .
  • Guess:  A  produces a bit  b , and wins if  b = b .
  • The IND-CPA advantage of  A  is defined as:
    Adv Π IND - CPA ( A ) = 2 Pr [ A wins ] 1 .
INT-CTXT (Integrity of Ciphertexts) requires that no adversary can forge a fresh ciphertext that decrypts to a non-⊥ plaintext. This notion captures the authenticity of an AE scheme. It requires that an adversary, even after seeing valid ciphertexts for messages of its choice, cannot produce a new ciphertext that will be accepted as valid by the decryption algorithm. In other words, any attempt to forge, modify, or recombine ciphertexts without knowledge of the secret key should be detected, and the decryption algorithm should reject such inputs.
Definition 2
(INT-CTXT). For an AE scheme  Π = ( Enc , Dec )  the INT-CTXT security is defined by the following game between a challenger and an adversary  A :
  • Key Generation: The challenger picks a random key K and empty set S.
  • Queries:  A  is allowed to make two types of queries:
    • Encryption Queries: For each query of  ( A , P ) , the challenger responds with  Enc K ( A , P ) . At the same time S S { ( A , C ) ) } .
    • Decryption Queries: For each query of  ( A , C ) , the challenger responses with  M = Dec K A , C . If  M  and  ( A , C ) S , then the adversary wins.
  • The INT-CTXT advantage of  A  is defined as:
    Adv Π INT - CTXT ( A ) = Pr [ A wins ] .

2.3. CBC Scheme

The CBC scheme is a widely utilized mode of operation for block ciphers. It enhances cryptographic security by introducing a chained dependency into the encryption process, whereby each plaintext block is combined with the preceding ciphertext block before encryption (Figure 1).
Definition 3
(CBC Scheme). Let  K $ Key . The encryption and decryption of  C B C  is defined as follows:
1. 
EncK(P) = (C1, …, Cm), where  P = ( P 1 , P 2 , , P m )  is a plaintext consisting of blocks  P i ( i = 1 , , m ) , C 0 = I V $ { 0 , 1 } n  and  C i = E K ( P i C i 1 ) , 1 i m .
2. 
DecK(C) = P1Pm, where  C = ( I V , C 1 , , C m ) , and  P i = D K ( C i ) C i 1 , 1 i m .

2.4. Enhanced CBC Scheme

The Enhanced CBC (eCBC) scheme [9] is a modified version of CBC scheme that uses two independent keys: K 1 for underlying block cipher and K 2 for a keyed hash function H (Figure 2). The goal is to combine the chaining structure of CBC with an additional integrity check derived from hashed ciphertext blocks. Therefore eCBC is AE scheme.
Definition 4
(eCBC Scheme [9]). For a given message  P = ( P 1 , P 2 , , P m )  and authentication data  ADD , the AE scheme  e C B C  is defined as follows:
1. 
Encryption:  C 0 = I V $ { 0 , 1 } n  and  C i = E K 1 H K 2 ( C i 1 ) P i , i = 1 , , m . Tag = ADD i = 1 m H k 2 ( C i ) . The final ciphertext is  ( I V , C 1 , , C m , Tag ) .
2. 
Decryption: For a given ciphertext  ( I V , C 1 , , C m , Tag ) , the receiver first verifies authenticity by recomputing  Tag = ADD i = 1 m H K 2 ( C i ) . If  Tag Tag , the ciphertext is rejected andis output. Otherwise, the plaintext blocks are recovered as  P i = D K 1 ( C i ) H K 2 ( C i 1 ) , i = 1 , , m .
For the Encryption process, eCBC follows the structure of CBC with the XOR step with its keyed hash H k 2 ( C i 1 ) . The authentication tag is computed by XOR—aggregating the hashes of all ciphertext blocks and optionally an associated value ADD . Note that the original work [9] does not specify how ADD should be chosen or used; therefore, ADD is simply set to 0, which does not affect the validity of the results.

2.5. Medical Images Application of eCBC Scheme

In 2025, Alsaraireh et al. [10] proposed the application of eCBC scheme in medical images named diagonal block encryption (Figure 3). The proposed image scheme divides an image into blocks. Non-diagonal blocks are processed deterministically using inter-block differences and XOR with diagonal blocks. Only diagonal blocks are encrypted under eCBC.
Definition 5
(Diagonal Block Encryption [10]). The medical image is divided into an  n × n  block matrix  M = ( B i , j ) 1 i , j n , where each block  B i , j  is further partitioned into sub-blocks size  16 × 16 . The diagonal block encryption scheme is defined as follows:
1. 
Encryption: The scheme applies two different procedures:
(a) 
Non-diagonal blocks. Each non-diagonal block  B i , j  with  i j  is processed deterministically before any encryption takes place. For each pixel  ( x , y )  inside  B i , j , the scheme computes
B ˜ i , j ( x , y ) = B i , j ( x , y ) B i 1 , j 1 ( x , y ) mod 256 B i , i ( x , y ) ,
where subtraction is modulo 256 and the XOR uses the corresponding pixel of the diagonal block  B i , i .
(b) 
Diagonal blocks. After the non-diagonal preprocessing, each diagonal block  B i , i  is encrypted using Enhanced CBC. The sub-blocks of  B i , i  are serialized and divided into 128-bit segments, which serve as plaintext inputs  P = ( P 1 , , P m )  for eCBC. Encryption then produces the ciphertext sequence  ( I V , C 1 , , C m , Tag ) .
  • The final ciphertext image consists of the deterministically transformed non-diagonal blocks  B ˜ i , j , the eCBC ciphertext of the diagonal blocks  ( I V , C 1 , , C m , Tag ) .
2 
Decryption: Upon inputting the ciphertext image, the receiver reconstructs the original image as follows:
(a) 
Diagonal blocks. The ciphertext ( I V , C 1 , , C m , Tag ) is first verified using the eCBC algorithm. If the recomputed tag does not match the received Tag , the image is rejected. Otherwise, the diagonal blocks B i , i are recovered by decrypting their sub-blocks with eCBC.
(b) 
Non-diagonal blocks. Once the diagonal blocks have been restored, the non-diagonal blocks are reconstructed by inverting the deterministic preprocessing step:
B i , j ( x , y ) = B ˜ i , j ( x , y ) B i , i ( x , y ) + B i 1 , j 1 ( x , y ) mod 256 .
This inversion is well-defined since both XOR and modular subtraction are reversible operations.
  • The output of decryption is the full reconstructed image  M = ( B i , j ) 1 i , j n .

3. Breaking Enhanced CBC Scheme

Below, three types of attacks against eCBC scheme are presented, including IV substructure attack, cancellation attack, and permutation attack. Each attack can succeed with a probability of 1.

3.1. IV-Substitution Attack

Suppose the adversary has obtained a valid ciphertext ( I V , C 1 , , C m , Tag ) that was honestly generated under the secret keys. Then for an arbitrary new value I V I V , ( I V , C 1 , , C n , Tag ) is a successfully forgery that can be verified.
Analysis. In the Enhanced CBC scheme, the authentication tag Tag is computed solely as an XOR aggregation of the keyed hashes of the ciphertext blocks ( C 1 , , C n ) (and ADD ). The IV is not included in this computation. Consequently, when the receiver verifies the forged ciphertext, it recomputes the tag from ( C 1 , , C n ) , obtains the same value, and accepts the ciphertext as valid. The decryption algorithm then uses the modified IV I V in the recovery of the first plaintext block:
P 1 = D k 1 ( C 1 ) I V .
This produces a well-formed but altered plaintext, rather than outputting ⊥. Because the adversary has generated a fresh ciphertext that is accepted by the scheme and decrypts to a different message, this constitutes a successful INT-CTXT forgery.

3.2. Cancellation Attack

The adversary directly constructs ( I V , C , C , C , C , 0 ) , where I V and C are arbitrary block values. Then it is a successfully forgery.
Analysis. In Enhanced CBC, the authentication tag is computed as
Tag = ADD i = 1 n H k 2 ( C i ) .
When ADD = 0 (as assumed in the original specification), the tag reduces to the XOR of the keyed hashes of all ciphertext blocks Tag = i = 1 n H k 2 ( C i ) . If the adversary repeats the same block C an even number of times (e.g., four copies), the corresponding hash values cancel out:
H k 2 ( C ) H k 2 ( C ) H k 2 ( C ) H k 2 ( C ) = 0 .
Hence the recomputed tag equals 0, exactly matching the adversary’s chosen value. As a result, the receiver accepts the forged ciphertext as authentic. Decryption then proceeds with the repeated ciphertext blocks and arbitrary IV, producing a valid plaintext rather than rejecting with ⊥. This yields a successful INT-CTXT forgery.

3.3. Permutation Attack

Suppose the adversary has obtained a valid ciphertext ( I V , C 1 , , C m , Tag ) that was honestly generated under the secret keys. The adversary chooses any non-trivial permutation π of the set { 1 , , n } , then ( I V , C π ( 1 ) , C π ( 2 ) , , C π ( m ) , Tag ) is a successfully forgery that can be verified, where I V is any initialization vector, possibly equal to I V or chosen arbitrarily.
Analysis. The authentication tag is defined as Tag = i = 1 m H k 2 ( C i ) . Since XOR aggregation is commutative and associative, the tag depends only on the multiset of ciphertext blocks, not on their order. Thus, when the blocks are permuted, the recomputed tag remains exactly the same as before. The verification procedure therefore accepts the permuted ciphertext as valid. However, decryption of the permuted sequence produces a different plaintext, because each block is combined with the hash of a different predecessor. This constitutes a fresh ciphertext that is accepted but decrypts to an altered message, violating INT-CTXT.
The forgery attacks described above all stem from two fundamental design flaws in Enhanced CBC. First, the initialization vector (IV) is never incorporated into the computation of the authentication tag. As a result, an adversary can arbitrarily replace the IV without affecting tag verification, directly enabling IV-substitution forgeries. Second, the authentication tag is defined as a simple XOR aggregation of the keyed hashes of ciphertext blocks. This linear structure makes the tag invariant under the reordering of blocks, and further allows even multiplicities of identical blocks to cancel out. Consequently, an adversary can generate valid forgeries by permuting blocks, duplicating them an even number of times, or splicing blocks across ciphertexts, all without knowledge of the secret keys. These weaknesses demonstrate that Enhanced CBC provides no meaningful authenticity guarantee: the mode fails the INT-CTXT definition and cannot be considered a secure AE construction.

3.4. Comparison with SIV

Here, the design scheme and authentication process for the authenticated encryption scheme SIV are presented. In SIV (Figure 4), IV is generated internally and serves as an authentication function. During decryption, IV undergoes nonlinear calculations, which can avoid IV substructure attack, cancellation attack and permutation attack.
Definition 6
(SIV Scheme). Let K 1 , K 2 $ Key , H = ( H 1 , . . . , H m ) be the header, F is a PRF and ( E , D ) be a IV-based encryption scheme. The encryption and decryption of S I V is defined as follows:
1. 
E n c K 1 , K 2 ( H , P ) = I V C , where  I V = F K 1 ( H , P )  and  C = E K 2 I V ( P ) .
2. 
D e c K 1 , K 2 ( H , C ) = P , where  P = D K 2 I V ( C ) , I V = F K 1 ( H , P ) . If  I V = I V  then return P, else return ⊥.

4. Breaking Image Encryption Using Enhanced CBC

4.1. Failure of Confidentiality

In the medical image encryption scheme (Definition 5), only the diagonal blocks are encrypted under eCBC, while the non-diagonal blocks are processed deterministically using inter-block differencing and XOR substitution with the corresponding diagonal blocks. Crucially, this operation involves no secret key and no nonce. As a result, the mapping from non-diagonal plaintext blocks to their transformed outputs is completely deterministic and public.
The diagonal block encryption (Definition 5) [10] is not IND-CPA secure.
Analysis. An adversary chooses two different images M 0 and M 1 that share the same diagonal blocks but differ in their non-diagonal blocks. The adversary then submits ( M 0 , M 1 ) to the IND-CPA challenger. In the challenge ciphertext, the diagonal part is encrypted with eCBC, but the non-diagonal part appears after deterministic transformation. Since the transformation is keyless and repeatable, the adversary can directly compare the deterministic outputs of the non-diagonal blocks in the challenge ciphertext against those of M 0 and M 1 , and immediately determine which image was encrypted.
The success of the attack is due to the fact that non-diagonal transformations are deterministic, identical plaintext blocks always yield identical transformed outputs. This directly leaks equality patterns and structural information across ciphertexts. Moreover, re-encrypting the same image (or even just the same non-diagonal content) always produces identical results for those parts, violating the requirement that encryptions of chosen messages should be indistinguishable. Hence the scheme fails to achieve semantic security: an adversary can distinguish challenge encryptions with advantage 1, breaking IND-CPA.

4.2. Failure of Authenticity

The image scheme relies on Enhanced CBC to provide authenticity for the diagonal blocks. However, as shown in Section 3, eCBC is vulnerable to simple INT-CTXT forgeries such as IV-substitution, block cancellation, and permutation. These same attacks can be directly applied to the diagonal ciphertexts in the image scheme, producing modified images that still pass verification. Hence, the authenticity guarantee claimed by the scheme collapses, and the construction fails to meet the INT-CTXT notion.
In IoT Healthcare systems, an adversary can exploit INT-CTXT forgery vulnerabilities in eCBC to intercept and maliciously alter encrypted medical images. Such manipulation could lead to misdiagnosis by medical practitioners. Furthermore, the IND-CPA weakness (deterministic processing of non-diagonal blocks) enables an adversary to analyze encrypted traffic and identify patterns corresponding to specific physiological events (e.g., arrhythmia alarms). This enables the forgery or replay of malicious commands to medical devices. Critically, as these attacks require no breaking of the underlying block cipher and succeed with a probability close to 1, even resource-constrained adversaries can deploy them, significantly elevating the real-world threat level. Therefore, it is strongly recommended that thoroughly analyzed and standardized authenticated encryption schemes be adopted instead.

5. Conclusions

The Enhanced CBC (eCBC) does not provide ciphertext integrity. Because the IV is unauthenticated and the tag is computed as a linear XOR of ciphertext-dependent hashes, simple forgery attacks such as IV substitution, permutation, and cancellation succeed with probability 1. The medical image application diagonal block encryption adopting eCBC inherits these flaws. Compounding this, its deterministic processing of non-diagonal blocks enables distinguishing attacks by leaking structural information. Thus, the scheme fails to achieve both IND-CPA confidentiality and INT-CTXT authenticity.
Therefore, neither eCBC scheme nor its application to medical image protection meets the established AE security goals. To ensure robust protection of sensitive data such as medical images, future designs should abandon ad hoc modifications of classical modes and instead adopt well-studied and standardized AE schemes, such as GCM, CCM, OCB, or SIV, or the lightweight AE algorithms emerging from the NIST LWC standardization process (e.g., Ascon). These constructions offer provable security guarantees under the widely accepted IND-CPA and INT-CTXT definitions, and their security has been validated both theoretically and in practice. In the future, a comparison on the adaptation of well-studied and standardized AE schemes in the field of medical imaging deserves further research.

Author Contributions

Conceptualization, P.W.; Methodology, S.M.; Validation, G.L.; Writing—original draft, S.M.; Writing—review & editing, P.W., Y.J. and Y.C.; Visualization, S.M.; Supervision, G.L. and Y.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Key Laboratory of Security Communication Foundation (2024, 6142103042409) and the Fundamental Research Funds for the Central Universities (Grant Number: 3282025001).

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CBCCipher Block Chaining
eCBCEnhanced Cipher Block Chaining Scheme
AEAuthentication Encryption
MACMessage Authentication Code
IND-CPAIndistinguishability under Chosen-Plaintext Attack
INT-CTXTIntegrity of Ciphertexts
GCMGalois/Counter Mode
CCMCounter with CBC-MAC
OCBOffset Codebook Mode
IVInitialization Vector
SIVSynthetic IV

References

  1. Bellare, M.; Namprempre, C. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In Advances in Cryptology—ASIACRYPT 2000, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, 3–7 December 2000; Okamoto, T., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2000; Volume 1976, pp. 531–545. [Google Scholar] [CrossRef]
  2. Rogaway, P. Authenticated-encryption with associated-data. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, 18–22 November 2002; Atluri, V., Ed.; ACM: New York, NY, USA, 2002; pp. 98–107. [Google Scholar] [CrossRef]
  3. National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2007. [Google Scholar]
  4. National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2004. [Google Scholar]
  5. Krovetz, T.; Rogaway, P. The Software Performance of Authenticated-Encryption Modes. In Fast Software Encryption, Proceedings of the 18th International Workshop, FSE 2011, Lyngby, Denmark, 13–16 February 2011; Joux, A., Ed.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 306–327. [Google Scholar]
  6. Rogaway, P.; Shrimpton, T. A Provable-Security Treatment of the Key-Wrap Problem. In Advances in Cryptology—EUROCRYPT 2006, Proceedings of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 28 May–1 June 2006; Vaudenay, S., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2006; Volume 4004, pp. 373–390. [Google Scholar] [CrossRef]
  7. National Institute of Standards and Technology. Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2025. [Google Scholar]
  8. National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation—Methods and Techniques; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001. [Google Scholar]
  9. Alslman, Y.S.; Ahmad, A.; AbuHour, Y. Enhanced and authenticated cipher block chaining mode. Bull. Electr. Eng. Inform. 2023, 12, 2357–2362. [Google Scholar] [CrossRef]
  10. Alsaraireh, S.; Ahmad, A.; AbuHour, Y. New Step in Lightweight Medical Image Encryption and Authenticity. Mathematics 2025, 13, 1799. [Google Scholar] [CrossRef]
Figure 1. CBC scheme ( m = 4 ).
Figure 1. CBC scheme ( m = 4 ).
Mathematics 13 03595 g001
Figure 2. eCBC Scheme ( m = 4 ).
Figure 2. eCBC Scheme ( m = 4 ).
Mathematics 13 03595 g002
Figure 3. Diagonal block encryption ( 4 × 4 block matrix).
Figure 3. Diagonal block encryption ( 4 × 4 block matrix).
Mathematics 13 03595 g003
Figure 4. The SIV scheme.
Figure 4. The SIV scheme.
Mathematics 13 03595 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mao, S.; Wang, P.; Jia, Y.; Liu, G.; Chen, Y. Breaking Enhanced CBC and Its Application. Mathematics 2025, 13, 3595. https://doi.org/10.3390/math13223595

AMA Style

Mao S, Wang P, Jia Y, Liu G, Chen Y. Breaking Enhanced CBC and Its Application. Mathematics. 2025; 13(22):3595. https://doi.org/10.3390/math13223595

Chicago/Turabian Style

Mao, Shuping, Peng Wang, Yan Jia, Gang Liu, and Ying Chen. 2025. "Breaking Enhanced CBC and Its Application" Mathematics 13, no. 22: 3595. https://doi.org/10.3390/math13223595

APA Style

Mao, S., Wang, P., Jia, Y., Liu, G., & Chen, Y. (2025). Breaking Enhanced CBC and Its Application. Mathematics, 13(22), 3595. https://doi.org/10.3390/math13223595

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop