All-or-nothing transform

All-or-nothing transform

In cryptography, an all-or-nothing transform (AONT), also known as an all-or-nothing protocol, is an encryption mode which allows the data to be understood only if all of it is known. AONTs are not encryption, but frequently make use of symmetric ciphers and may be applied before encryption. In exact terms, "an AONT is an unkeyed, invertible, randomized transformation, with the property that it is hard to invert unless all of the output is known." [http://theory.lcs.mit.edu/~boyko/aont-oaep.html]

Algorithms

The original AONT, the "package transform", was described by Ronald L. Rivest in [http://theory.lcs.mit.edu/~cis/pubs/rivest/fusion.ps All-Or-Nothing Encryption and The Package Transform] . Simply put, Rivest proposed encrypting each plaintext block with a random key to form the "pseudomessage", then hashing each block and XORing all the hashes together with the random key to generate the last block of the pseudomessage. The blocks are also XOR'd with an incrementing counter to prevent duplicate blocks encrypting identically. This results in a "package" that cannot be partially decoded.

The package transform can use a cipher in any mode, creating the package ECB transform, package CBC transform, etc.

In 1999, Victor Boyko proposed another AONT using OAEP, provably secure under the random oracle model.

Applications

AONTs can be used to increase the strength of encryption without increasing the key size. This may be useful to, for example, secure secrets while complying with government cryptography export regulations. AONTs help prevent several attacks.

See also

* Secret sharing

References

* Rivest, Ronald R. [http://theory.lcs.mit.edu/~cis/pubs/rivest/fusion.ps All-Or-Nothing Encryption and The Package Transform] .
* Boyko, Victor. [http://theory.lcs.mit.edu/~cis/cis-exposure.html On the Security Properties of OAEP as an All-or-nothing Transform]


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • All or Nothing — may refer to:In music: * All or Nothing (Fat Joe album) * All or Nothing (Luba album) * All or Nothing (Milli Vanilli album), a Europe only release ** All or Nothing (remix album), an album by Milli Vanilli, the European version of the U.S.… …   Wikipedia

  • Nothing comes from nothing — (Latin: ex nihilo nihil fit) is a philosophical expression of a thesis first argued by Parmenides. It is associated with ancient Greek cosmology, such as presented not just in the opus of Homer and Hesiod, but also in virtually every… …   Wikipedia

  • Weierstrass transform — In mathematics, the Weierstrass transform [Ahmed I. Zayed, Handbook of Function and Generalized Function Transformations , Chapter 18. CRC Press, 1996.] of a function f : R rarr; R is the function F defined by:F(x)=frac{1}{sqrt{4piint {… …   Wikipedia

  • Discrete cosine transform — A discrete cosine transform (DCT) expresses a sequence of finitely many data points in terms of a sum of cosine functions oscillating at different frequencies. DCTs are important to numerous applications in science and engineering, from lossy… …   Wikipedia

  • Integral transform — In mathematics, an integral transform is any transform T of the following form:: (Tf)(u) = int {t 1}^{t 2} K(t, u), f(t), dt.The input of this transform is a function f , and the output is another function Tf . An integral transform is a… …   Wikipedia

  • Optimal asymmetric encryption padding — This article is about the padding scheme used in public key cryptography. For the division of the Thailand Ministry of Science Technology and Environment entitled Office of Atomic Energy for Peace, see [1]. In cryptography, Optimal Asymmetric… …   Wikipedia

  • Chaffing and winnowing — is a cryptographic technique to achieve confidentiality without using encryption when sending data over an insecure channel. The name is derived from agriculture: after grain has been harvested and threshed, it remains mixed together with… …   Wikipedia

  • Interlock protocol — The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an …   Wikipedia

  • Germany — /jerr meuh nee/, n. a republic in central Europe: after World War II divided into four zones, British, French, U.S., and Soviet, and in 1949 into East Germany and West Germany; East and West Germany were reunited in 1990. 84,068,216; 137,852 sq.… …   Universalium

  • List of Dragon Ball Z Kai episodes — Japanese promotional poster of Dragon Ball Kai Dragon Ball Z Kai (known in Japan as Dragon Ball Kai) is a revised version of the ani …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”