Correcting flaws in Mitchell’s analysis of EPBC

Di, Binbin, Simpson, Leonie, Bartlett, Harry, Dawson, Ed, & Wong, Kenneth Koon-Ho (2015) Correcting flaws in Mitchell’s analysis of EPBC. In Welch, Ian & Yi, Xun (Eds.) Proceedings of the 13th Australasian Information Security Conference, Conferences in Research and Practice in Information Technology (CRPIT), Sydney, NSW, pp. 57-60.


Efficient error-Propagating Block Chaining (EPBC) is a block cipher mode intended to simultaneously provide both confidentiality and integrity protection for messages. Mitchell’s analysis pointed out a weakness in the EPBC integrity mechanism that can be used in a forgery attack. This paper identifies and corrects a flaw in Mitchell’s analysis of EPBC, and presents other attacks on the EPBC integrity mechanism.

Impact and interest:

0 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

32 since deposited on 03 Feb 2015
6 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 81350
Item Type: Conference Paper
Refereed: Yes
Additional URLs:
Keywords: block cipher, authenticated encryption, EPBC, forgery attack
Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Encryption (080402)
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Current > Institutes > Institute for Future Environments
Current > Schools > School of Mathematical Sciences
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2015, Australian Computer Society, Inc.
Copyright Statement: This
paper appeared at the 13th Australasian Information Security
Conference (AISC 2015), Sydney, Australia, January 2015.
Conferences in Research and Practice in Information
Technology (CRPIT), Vol. 161. I Welch and X Yi, Eds.
Reproduction for academic, not-for-profit purposes permitted
provided this text is included.
Deposited On: 03 Feb 2015 23:38
Last Modified: 07 Feb 2015 23:59

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page