Notes in Computer Science 2656
نویسندگان
چکیده
In this paper, we study the security of the Encrypt-MaskDecrypt mode of operation, also called EMD, which was recently proposed for applications such as disk-sector encryption. The EMD mode transforms an ordinary block cipher operating on n–bit blocks into a tweakable block cipher operating on large blocks of size nm bits. We first show that EMD is not a secure tweakable block cipher and then describe efficient attacks in the context of disk-sector encryption. We note that the parallelizable variant of EMD, called EME that was proposed at the same time is also subject to these attacks. In the course of developing one of the attacks, we revisit Wagner’s generalized birthday algorithm and show that in some special cases it performs much more efficiently than in the general case. Due to the large scope of applicability of this algorithm, even when restricted to these special cases, we believe that this result is of independent interest.
منابع مشابه
Tv and or Fm Transmitting Antennas Desien Using Computer Graphic System (RESEARCH NOTES)
The purpose of this paper is three fold. First, the major theoretical pattern relationships of TV and/or FM transmitting antennas are dealt with. Secend, the computer calculation method and designing of such patterns using the given relationships. And third, a method in which a computer graphic system can be used to design such antennas for a specific pattern is introduced and its results are p...
متن کاملSome notes concerning the convergence control parameter in homotopy analysis method
omotopy analysis method (HAM) is a promising method for handling func-tional equations. Recent publications proved the eectiveness of HAM in solvingwide variety of problems in dierent elds. HAM has a unique property whichmakes it superior to other analytic methods, this property is its ability to con-trol the convergence region of the solution series. In this work, we claried theadvantages and ...
متن کاملspectra of dimers such as ( H An adiabatic model for calculating overtone
References related-urls http://rsta.royalsocietypublishing.org/content/370/1968/2656.full.html# Article cited in: l.html#ref-list-1 http://rsta.royalsocietypublishing.org/content/370/1968/2656.ful This article cites 56 articles, 3 of which can be accessed free Subject collections (13 articles) atomic and molecular physics (39 articles) atmospheric science collections Articles on similar t...
متن کاملEvidence of the Potential Shift Mechanism in Crevice Corrosion (RESEARCH NOTES)
Previous research has indicated a qualitative resemblance between the current distribution along actively corroding crevice walls and currents measured in corresponding anodic polarization plots. Using detailed measurements of the potential gradient along the crevice, a semi-quantitative current distribution was calculated for the crevice wall using a double numerical differentiation method. Th...
متن کامل