[144451] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Warning! New cryptographic modes!

daemon@ATHENA.MIT.EDU (Jerry Leichter)
Thu May 21 17:18:43 2009

Cc: Cryptography List <cryptography@metzdowd.com>
From: Jerry Leichter <leichter@lrw.com>
To: Victor Duchovni <Victor.Duchovni@morganstanley.com>
In-Reply-To: <16A8A985-33AC-47D8-A50D-1DCCA171A3B7@lrw.com>
Date: Mon, 11 May 2009 19:00:17 -0400

> To handle smaller inserts or deletes, you need to ensure that the  
> underlying blocks "get back into sync".  The gzip technique I  
> mentioned earlier works.  Keep a running cryptographically secure  
> checksum over the last blocksize bytes.  When some condition on the  
> checksum is met - equals 0 mod M - insert filler to the beginning of  
> the next block before encrypting; discard to the beginning of the  
> next block when decrypting.  Logically, this is dividing the file up  
> into segments whose ends occur at runs of blocksize bytes that give  
> a checksum obeying the condition.  A change within a segment can at  
> most destroy that segment and the following one; any other segments  
> eventually match up.
Oh, feh.  I'm typing without thinking.  In the worst case, an  
insertion (deletion) of K bytes could create (delete) K/M new  
(existing) segments.  In practice, this is unlikely except in an  
adversarial situation, and all it can do is force extra data to be  
transferred.
                                                         -- Jerry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post