[144446] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Warning! New cryptographic modes!

daemon@ATHENA.MIT.EDU (Roland Dowdeswell)
Mon May 11 16:48:06 2009

To: Jerry Leichter <leichter@lrw.com>
Cc: Cryptography List <cryptography@metzdowd.com>
In-reply-to: Your message of "Sun, 10 May 2009 18:55:28 EDT."
             <DFEEEC7B-08D8-4AE0-AC14-0F8E951745ED@lrw.com> 
Date: Mon, 11 May 2009 14:16:45 -0400
From: Roland Dowdeswell <elric@imrryr.org>

On 1241996128 seconds since the Beginning of the UNIX epoch
Jerry Leichter wrote:
>

>So here we have it all:  A new cryptographic mode, documented only in  
>C code, being proposed for broad use with no analysis.
>
>In any case, there are obvious, well-understood solutions here:  Use  
>counter mode, which propagates changes by a single block of the  
>cryptosystem.  Or use any other stream cipher mode.  (An interesting  
>question is whether there's a mode that will recover from insertions  
>or deletions.  Perhaps something like:  Use counter mode.  If two  
>consecutive ciphertext bytes are 0, fill the rest of the ciphertext  
>block with 0's, jump the counter by 65536, and insert a special block  
>containing the new counter value.)

I'm not convinced that a stream cipher is appropriate here because
if you change the data then you'll reveal the plaintext.

--
    Roland Dowdeswell                      http://Imrryr.ORG/~elric/

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post