[8294] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: IBM press release - encryption and authentication

daemon@ATHENA.MIT.EDU (David Wagner)
Sun Dec 17 22:54:20 2000

To: cryptography@c2.net
From: daw@mozart.cs.berkeley.edu (David Wagner)
Date: 18 Dec 2000 03:37:32 GMT
Message-ID: <91k0ps$m3$1@abraham.cs.berkeley.edu>
Reply-To: daw@cs.berkeley.edu (David Wagner)

William Allen Simpson  wrote:
>As far as I can tell, the only unique element is the mod 2^128 - 159 
>function.  We just need to use another function.
>
>My own favorite (in CBCS) has been rotation by the population count  [...]

The uniquely valuable aspect of Jutla's scheme (and other related
schemes, e.g. Gligor's or Rogaway's schemes) is that it comes with
a proof of security.

History shows that it is extremely easy to propose schemes for
encryption-with-integrity that are plausible-looking yet nonetheless
entirely broken.  At this point, I don't think I would trust very much
a proposal without a proof.

And I think it would be fair to say that CBCS falls into the camp of
plausible but unproven proposals.  (Correct me if I'm wrong!)


home help back first fref pref prev next nref lref last post