【24h】

Modifying an Enciphering Scheme After Deployment

机译:部署后修改加密方案

获取原文

摘要

Assume that a symmetric encryption scheme has been deployed and used with a secret key. We later must change the encryption scheme in a way that preserves the ability to decrypt (a subset of) previously encrypted plaintexts. Frequent real-world examples are migrating from a token-based encryption system for credit-card numbers to a format-preserving encryption (FPE) scheme, or extending the message space of an already deployed FPE. The ciphertexts may be stored in systems for which it is not easy or not efficient to retrieve them (to re-encrypt the plaintext under the new scheme). We introduce methods for functionality-preserving modifications to encryption, focusing particularly on deterministic, length-preserving ciphers such as those used to perform format-preserving encryption. We provide a new technique, that we refer to as the Zig-Zag construction, that allows one to combine two ciphers using different domains in a way that results in a secure cipher on one domain. We explore its use in the two settings above, replacing token-based systems and extending message spaces. We develop appropriate security goals and prove security relative to them assuming the underlying ciphers are themselves secure as strong pseudorandom permutations.
机译:假设已经部署了对称加密方案并与秘密密钥一起使用。我们以后必须更改加密方案,以保留解密先前加密的明文(的子集)的能力。现实世界中经常出现的示例是从用于信用卡号的基于令牌的加密系统迁移到格式保留加密(FPE)方案,或者扩展已经部署的FPE的消息空间。密文可以存储在不容易或效率不高的系统中(在新方案下对明文进行重新加密)。我们介绍了保留功能的加密修改方法的方法,尤其着重于确定性的,保留长度的密码,例如用于执行保留格式的加密的密码。我们提供了一种称为Zig-Zag构造的新技术,该技术允许一个人使用不同的域来组合两个密码,从而在一个域中产生安全的密码。我们在上面的两个设置中探索了它的用法,以替换基于令牌的系统并扩展了消息空间。我们假设基本密码本身作为强伪随机置换是安全的,我们将制定适当的安全目标并证明相对于它们的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号