On Improving Performance of One Block Ciphers Mode of Operation Used for Protection of Block-Oriented System Storage Devices

Georgy Firsov, Alisa Koreneva

Abstract


In the end of 2022 in Russian Federation a block ciphers mode of operation named DEC (Disk Encryption with Counter) for protection of block-oriented storage devices was adopted as recommendations for standardization. Due to its operational properties, it is complicated to use it for system partition encryption. In modern software for disk encryption, XTS mode of operation is widely spread. However, properties of the XTS mode lead to degradation of its cryptographic qualities. Previously the authors introduced XEH (Xor-Encrypt-Hash) mode of operation, that mitigates weaknesses of the XTS mode. This paper describes a block ciphers mode of operation XEHf (XEH fast), aimed to improve performance of the XEH mode. Its security is proven in chosen ciphertext attack setting, and its operational properties are studied.


Full Text:

PDF

References


Isobe, T., & Minematsu, K. (2020). “Plaintext recovery attacks against XTS beyond collisions” in K. G. Paterson, D. Stebila (eds.), Selected Areas in Cryptography - SAC 2019, 103–123. Springer, Cham.

Firsov, G., & Koreneva, A. (2022). On One Block Cipher Mode of Operation Used to Protect Data on Block-Oriented Storage Devices. Modern Information Technologies and IT- Education, 18(3), 691–701.

R 1323565.1.042-2022. Information technology. Cryptographic protection of information. Block ciphers mode of operation designed to protect of data storage medium with a block-oriented structure. (2022). Russian National Bureau of Standards.

Bogdanov, D., & Nozdrunov, V. (2021). Some properties of one mode of operation of block ciphers. In 10th Workshop on Current Trends in Cryptology (CTCrypt 2021). Pre-proceedings (pp. 12–17).

Firsov, G., & Koreneva, A. (2023). On one block cipher mode of operation for protection of block-oriented storage devices. Applied Discrete Mathematics. Supplement, 16(1), 52–56.

Firsov, G., & Koreneva, A. (2024). On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices. Journal of Computer Virology and Hacking Techniques.

Liskov, M., Rivest, R. L., & Wagner, D. (2010). Tweakable block ciphers. Journal of Cryptology, 24(3), 588–613.

GOST 34.12-2018. Information technology. Cryptographic protection of information. Block ciphers. (2018). Russian National Bureau of Standards.

Bellare, M., & Rogaway, P. (2005). Introduction to Modern Cryptography.

Halevi, S. (2007). “Invertible Universal Hashing and the TET Encryption Mode” in Menezes, A. (ed), Advances in Cryptology - CRYPTO 2007. CRYPTO 2007. Lecture Notes in Computer Science. 4622, 412–429. Springer, Berlin, Heidelberg.

Sarkar, P. (2009). Efficient tweakable enciphering schemes from (block-wise) universal hash functions. IEEE Transactions on Information Theory, 55(10), 4749–4760.


Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность IT Congress 2024

ISSN: 2307-8162