On Dec 22, 2005, at 7:32 PM, [EMAIL PROTECTED] wrote:

a "wrong key behavior" can be beyond the scope
The issue is rather: can the raw, encrypted data be read from the drive? Maybe, the standard could just say in the introduction that LRW is weak
against traffic analysis,

We know that LRW is vulnerable to a per 16 byte block code book attack (active and passive). EME is vulnerable to a per sector code book attack (again passive and active). So the difference is the level of granularity.

If you want EME or EME-like algorithm, make the proposal and we will consider it on the P1619a round.

Thanks

jim

Reply via email to