COMPLEMENTARITY ATTACKS AND CONTROL VECTORS

Citation
D. Longley et Sm. Matyas, COMPLEMENTARITY ATTACKS AND CONTROL VECTORS, IBM systems journal, 32(2), 1993, pp. 321-325
Citations number
2
Categorie Soggetti
System Science","Computer Applications & Cybernetics
Journal title
ISSN journal
00188670
Volume
32
Issue
2
Year of publication
1993
Pages
321 - 325
Database
ISI
SICI code
0018-8670(1993)32:2<321:CAACV>2.0.ZU;2-O
Abstract
A control vector is a data structure that specifies the nature and rol e of an associated cryptographic key. The control vector is checked by software and cryptographic hardware in order to limit the range of pe rmissible operations to be undertaken with ciphertext produced with th e key. The linking of the control vector and cryptographic key is such that attempts to modify, or substitute, control vectors will cause th e subsequent processing to operate with a corrupted key, and hence ens ure protection of data encrypted with the genuine key. A potential att ack on the control vector approach is described in which the complemen t of the control vector is substituted. The manner in which such attac ks are thwarted by the IBM implementation of control vectors is also d escribed.