Warning! New cryptographic modes!

Jerry Leichter leichter at lrw.com
Mon May 11 19:00:17 EDT 2009


> To handle smaller inserts or deletes, you need to ensure that the  
> underlying blocks "get back into sync".  The gzip technique I  
> mentioned earlier works.  Keep a running cryptographically secure  
> checksum over the last blocksize bytes.  When some condition on the  
> checksum is met - equals 0 mod M - insert filler to the beginning of  
> the next block before encrypting; discard to the beginning of the  
> next block when decrypting.  Logically, this is dividing the file up  
> into segments whose ends occur at runs of blocksize bytes that give  
> a checksum obeying the condition.  A change within a segment can at  
> most destroy that segment and the following one; any other segments  
> eventually match up.
Oh, feh.  I'm typing without thinking.  In the worst case, an  
insertion (deletion) of K bytes could create (delete) K/M new  
(existing) segments.  In practice, this is unlikely except in an  
adversarial situation, and all it can do is force extra data to be  
transferred.
                                                         -- Jerry

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list