On Dec 22, 2005, at 7:32 PM, [EMAIL PROTECTED] wrote:
a "wrong key behavior" can be beyond the scope
The issue is rather: can the raw, encrypted data be read from the
drive?
Maybe, the standard could just say in the introduction that LRW is
weak
against traffic analysis,
We know that LRW is vulnerable to a per 16 byte block code book
attack (active and passive). EME is vulnerable to a per sector code
book attack (again passive and active). So the difference is the
level of granularity.
If you want EME or EME-like algorithm, make the proposal and we will
consider it on the P1619a round.
Thanks
jim