RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2025 Issue 18, Pages 120–128 (Mi pdma698)

Mathematical Methods of Cryptography

On some adaptive chosen text attacks on the applied cryptographic protocols

A. A. Elistratov, N. V. Nikonov


Abstract: This paper provides an overview of applied cryptographic protocols, including IPsec, TLS, SSH, SCP, S/MIME, EMV, and Cryptoki, and their vulnerabilities to adaptive chosen-plaintext and chosen-ciphertext attacks, which are used for recovering plaintext from ciphertext without finding the key. These attacks are based on the ideas formulated by W. Dai, D. Bleichenbacher, S. Vaudenay and have many modifications represented by many authors. We present new ideas for modifying attacks, based on predictable plaintext data fields being encrypted and transmitted, which may make some versions of cryptoprotocols using AEAD vulnerable to these attacks. At the end of the paper, we formulate recommendations and countermeasures against these attacks, which will be useful for developing cryptoprotocols by Technical Committee 26 for standardization “Cryptography and security mechanisms”.

Keywords: applied cryptographic protocol, padding oracle attack, adaptive attack, block cipher mode of operation, authenticated encryption with associated data, Technical Committee 26 for standardization.

UDC: 519.7

DOI: 10.17223/2226308X/18/26



© Steklov Math. Inst. of RAS, 2026