A new mode of using all-or-nothing transforms
We suggest a new mode of using all-or-nothing transforms in conjunct with data encryption. Like Rivest (1997) we aim a slowdown of brute force attacks without extending the key length. However, we use a different scheme which is more efficient and flexible, and ensures that an adversary does not eve...
Saved in:
Published in: | Proceedings IEEE International Symposium on Information Theory p. 296 |
---|---|
Main Authors: | , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
2002
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | We suggest a new mode of using all-or-nothing transforms in conjunct with data encryption. Like Rivest (1997) we aim a slowdown of brute force attacks without extending the key length. However, we use a different scheme which is more efficient and flexible, and ensures that an adversary does not even know the exact ciphertext that has to be attacked. |
---|---|
ISBN: | 9780780375017 0780375017 |
DOI: | 10.1109/ISIT.2002.1023568 |