Scramble All, Encrypt Small

نویسندگان

  • Markus Jakobsson
  • Julien P. Stern
  • Moti Yung
چکیده

In this paper, we propose a new design tool for “block encryption”, allowing the en/decryption of arbitrarily long messages, but performing en/decryption on only a single block (e.g., 128 bit block), where the rest of the message is only processed by a good scrambling function (e.g., one based on an ideal hash function). The design can be a component in constructing various schemes where the above properties gives an advantage. A quite natural use of our scheme is for remotely keyed encryption. We actually solve an open problem (at least in the relaxed ideal hash model and where hosts are allowed to add randomness and integrity checks, thus giving a length increasing function); namely, we show the existence of a secure remotely keyed encryption scheme which performs only one interaction with the smart-card device.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smaller beetles are better scramble competitors at cooler temperatures.

The role of temperature is central to both organic evolution and ecological processes. However, how temperature affects selection on body size is unknown. We tested whether small seed beetles (Stator limbatus) have an advantage over large beetles during scramble competition for mates, and whether this advantage varies with temperature. Within lines of beetles artificially selected to be large v...

متن کامل

Knockdown of versican V1 induces a severe inflammatory response in LPS-induced acute lung injury via the TLR2-NF-κB signaling pathway in C57BL/6J mice

The versican family is important in the modulation of inflammation, however, the role of versican V1 (V1) in lipopolysaccharide (LPS)-induced acute lung injury (ALI) and the underlying mechanisms remain to be elucidated. To investigate this, the present study performed experiments in male C57BL/6J mice, which were randomly divided into a normal control group (control; n=6), an LPS‑stimulated AL...

متن کامل

Exploring the Dimensions of Human Sensitivity to Musical Tonality

This study investigates strategies available to listeners for classifying tone scrambles: rapid, randomly-ordered sequences of pure tones drawn from the thirteen notes from G5 to G6. In a given condition, the listener strives to classify each scramble in accordance with a specified feedback rule. For each of three conditions (“structured-random,” “major-minor,” and “squeezedspread”), we measure...

متن کامل

Shedding Light on the Adoption of Let's Encrypt

Let’s Encrypt is a new entrant in the Certificate Authority ecosystem that offers free and automated certificate signing. It is visionary in its commitment to Certificate Transparency. In this paper, we shed light on the adoption patterns of Let’s Encrypt “in the wild” and inform the future design and deployment of this exciting development in the security landscape. We analyze acquisition patt...

متن کامل

Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML

Simple Sign & Encrypt, by itself, is not very secure. Cryptographers know this well, but application programmers and standards authors still tend to put too much trust in simple Sign-and-Encrypt. In fact, every secure e-mail protocol, old and new, has codiied na ve Sign & Encrypt as acceptable security practice. MOSS all suuer from this aw. Similarly, the secure document protocols PKCS#7, XML-S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999