【24h】

On the Security Bounds of CMC, EME, EME~+ and EME Modes of Operation

机译:关于CMC,EME,EME〜+和EME操作模式的安全范围

获取原文
获取原文并翻译 | 示例

摘要

Since 2002, variants of two tweakable block cipher modes of operation, CMC and EME, have been presented by Halevi and Rogaway that are suitable for encryption of disk sectors. In this paper, we show that the security bounds given in their proofs are tight, and hence complement the security proofs of the designers. In particular, we show how to distinguish the CMC, EME, EME~+ and EME~* modes from random tweakable permutations with negligible effort and 2~(n/2) chosen plaintexts, where n is the block size in bits. Further, we point out that both modes leak secret information via side-channel attacks (timing and power) due to the data-dependent internal multiplication operation.
机译:自2002年以来,Halevi和Rogaway提出了两种可调整块密码操作模式的变体CMC和EME,它们适用于磁盘扇区的加密。在本文中,我们证明了其证明中给出的安全性边界是严格的,因此可以补充设计者的安全性证明。特别是,我们展示了如何以可忽略的努力和2〜(n / 2)个选定的明文从随机可调整的排列中区分CMC,EME,EME〜+和EME〜*模式,其中n是以位为单位的块大小。此外,我们指出,由于依赖于数据的内部乘法运算,这两种模式都会通过边信道攻击(定时和功率)泄漏秘密信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号