[144451] in cryptography@c2.net mail archive
Re: Warning! New cryptographic modes!
daemon@ATHENA.MIT.EDU (Jerry Leichter)
Thu May 21 17:18:43 2009
Cc: Cryptography List <cryptography@metzdowd.com>
From: Jerry Leichter <leichter@lrw.com>
To: Victor Duchovni <Victor.Duchovni@morganstanley.com>
In-Reply-To: <16A8A985-33AC-47D8-A50D-1DCCA171A3B7@lrw.com>
Date: Mon, 11 May 2009 19:00:17 -0400
> To handle smaller inserts or deletes, you need to ensure that the
> underlying blocks "get back into sync". The gzip technique I
> mentioned earlier works. Keep a running cryptographically secure
> checksum over the last blocksize bytes. When some condition on the
> checksum is met - equals 0 mod M - insert filler to the beginning of
> the next block before encrypting; discard to the beginning of the
> next block when decrypting. Logically, this is dividing the file up
> into segments whose ends occur at runs of blocksize bytes that give
> a checksum obeying the condition. A change within a segment can at
> most destroy that segment and the following one; any other segments
> eventually match up.
Oh, feh. I'm typing without thinking. In the worst case, an
insertion (deletion) of K bytes could create (delete) K/M new
(existing) segments. In practice, this is unlikely except in an
adversarial situation, and all it can do is force extra data to be
transferred.
-- Jerry
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com