首页> 外文期刊>電子情報通信学会技術研究報告. 情報セキュリティ. Information Security >Provable security of modes of operation for symmetric-key cryptography considering initial vectors
【24h】

Provable security of modes of operation for symmetric-key cryptography considering initial vectors

机译:考虑初始向量的对称密钥加密的操作模式的提供方式

获取原文
获取原文并翻译 | 示例
           

摘要

The study of the security of symmetric-key cryptography is classified into two areas, namely the security evaluation of schemes and that of the cryptographic primitives. Assuming the security of cryptographic primitives, the security of the scheme is proven. The security proof also requires limitations of adversary's ability and the IV generation. So far all symmetric-key schemes are proven by IV generations based on secret randomness or internal counters. Otherwise, it is known that all schemes are fail to achieve the strongest notions, e.g. Left-or-Right sense. In this paper, we discuss the relationship between IV generation and security of the symmetric-key cryptography. First we give the formalization of a block cipher and a stream cipher. For each of two mechanisms, we discuss the relationship between the IV and security. We put a special interest to specific modes of a block cipher. That mode requires very strict conditions to achieve the Left-or-Right sense security. In contrast, the mode can achieve the weaker security notions by the weakest IV generation, while securities of many schemes in symmetric-key cryptography suddenly fail to hide information by that IV generation.
机译:对称关键密码学的安全性研究分为两个区域,即方案的安全评估以及加密原语的安全评估。假设加密原语的安全性,证明了该计划的安全性被证明是验证的。安全证明还需要对福尔基的能力和IV生成的限制。到目前为止,所有对称关键方案都由基于秘密随机性或内部计数器的IV代来证明。否则,已知所有方案都未能达到最强的概念,例如,左或右意义。在本文中,我们讨论了对称密钥加密的IV生成和安全性之间的关系。首先,我们提供块密码和流密码的形式化。对于两个机制中的每一个,我们讨论了IV和安全之间的关系。我们对块密码的特定模式进行了特殊的兴趣。该模式需要非常严格的条件来实现左或右感觉安全。相比之下,该模式可以通过最弱的IV生成实现较弱的安全概念,而对称密钥加密中的许多方案的证券突然无法通过该IV生成隐藏信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号