-- SECTION 1: XEX ---

Has SISWG considered using XEX as specified in [Rog04] instead of LRW
for the
tweakable narrow-block encryption standard recommendation?

XEX is a general-purpose provably CCA-secure tweakable block cipher, and
like
LRW, an instantiation of the class of tweakable block ciphers described in
[LRW02]. XEX is the primary building block of OCB mode. It has many
advantages
over LRW, see below.

We will use XEX as specified on page 4 of [Rog04]. XEX is a general-purpose
algorithm, a concrete application for sector encryption follows.

Let a 512-byte sector with index N be divided into 32 plaintext blocks p_i,
i = 0..31 (16 bytes each). Let E_K(.) and D_K(.) denote AES encryption
and decryption
with key K. The transformed tweak T will be

   T = 2^i * E_K(N)

where i in [0 .. 31] is the block index in the sector. Sector will be
enciphered as follows:

T_0 = E_K(N)

for (i in [0 .. 31])
   c_i = E_K(p_i + T_i) + T_i
   T_(i+1) = T_i * 2

where c_i are ciphertext blocks, = is assignment, * and + are
multiplication and
addition in the field GF(2^128) respectively. Sector will be deciphered in a
similar manner:

T_0 = E_K(N)

for (i in [0 .. 31])
   p_i = D_K(c_i + T_i) + T_i
   T_(i+1) = T_i * 2

Multiplication by two will be carried out as specified in the SISWG EME
document
("two" is actually the second element of the field GF(2^128)). Addition is
equivalent to XORing.

Note that E_K(N) is only calculated once per sector, thus XEX-AES is not
significantly less efficient than LRW-AES. But we avoid the inconvenience of
implementing general multiplication in GF(2^128) and can use a
single key.

Summary benefits (in comparison with LRW):
- provably secure,
- as efficient as LRW,
- single key,
- only utilizes multiplication by "two", XOR and cipher calls,
- parallelizable,
- probably unencumbered by intellectual property issues. NOTE: Phillip
Rogaway
 has filed a patent on OCB, of which XEX is a subroutine. Even if the
patent
extends to XEX, a free licence is available for GPL-licenced
implementations. On
the other hand, it is unlikely that mr Rogaway will claim IP rights
on XEX, as it is a Liskov-Rivest-Wagner cipher and they have made no IP
claims on the theoretical construction XEX is directly based on. However,
this needs clarification.

--- SECTION 2: LRW-AES-TBC mode ---

If XEX is of no interest, has the working group considered using tweak
block chaining
mode as specified in [LRW02] as the standard for LRW implementations?
That considerably increases the security of LRW, creating a CBC-like
scheme that
alleviates the "LRW has more data modification leakage than CBC" problem
previously
pointed out by Adam J. Richter in [Richt04].

--- References ---

[LRW02] M. Liskov, R. Rivest, and D. Wagner. Tweakable block ciphers.
Crypto'02
2002.

[Rog04] Phillip Rogaway. Efficient Instantiations of Tweakable
Blockciphers and
Refinements to Modes OCB and PMAC. Asiacrypt 2004.
http://www.cs.ucdavis.edu/~rogaway/papers/offsets.html

[Richt04] Adam J. Richter. LRW has more data modification leakage than CBC?
http://grouper.ieee.org/groups/1619/email/msg00242.html

Reply via email to