Hi Jim,

On Dec 14, 2005, at 9:13 AM, [EMAIL PROTECTED] wrote:

Can the LRW-AES algorithm be used for authenticated encryption
for tapes?

With a superficial look, it seems like the following authentication
scheme works.

      C_i = LRW-AES( K1, K2, P_i, i )

      MAC = LRW-AES( K1, K2, CHECKSUM( P_0 ... P_n ),  (n+1) )

Obviously the key can't be reused since two encrypted data sets with
the same key can be cut and mixed to produce a third that passes
authentication.

If I understand you correctly, then this MAC is vulnerable whenever there is known plaintext. If an attacker can substitute one ciphertext block C_j for another value C'_j, such that the corresponding plaintext values P_j and P'_j both make the same contribution to the checksum, then the MAC would be unable to detect this modification. In general, an attacker could manipulate multiple blocks as well. If the checksum is unkeyed, then the attacker will very often be able to manipulate the checksum value by manipulating ciphertext, assuming of course that the attacker has knowledge about the plaintext blocks.

I've assumed here that the attacker is able to observe multiple plaintext/ciphertext values that occur *at the same location* on the disk or tape. It is probably safest to assume this, though in practice our biggest threat may not be the attacker who can observe the disk or tape for a long period of time.


This algorithm is fully parallelizable and requires fewer gates for
hardware implementation of the GF multiplication than the proposed GCM mode.

Do you mean because the LRW multiply can be implemented in a smaller circuit, since it is invoked only at the beginning of an encrypt operation, and a separate circuit is used to compute the "offset" values?

David


Also, the decrypted MAC will be a checksum which will catch any bit errors that
might occur within the AES logic block.  This does not seem to be the
case for GCM.

Sorry if I am overlooking anything stupid.

Reply via email to