Accelerated Remotely Keyed Encruption
نویسنده
چکیده
Remotely keyed encryption schemes (RKESs) support fast encryption and decryption using low-bandwidth devices, such as secure smartcards. The long-lived secret keys never leave the smartcard, but most of the encryption is done on a fast untrusted device, such as the smartcard’s host. This paper describes an new scheme, the length-preserving “accelerated remotely keyed” (ARK) encryption scheme and, in a formal model, provides a proof of security. For the sake of practical usability, our model avoids asymptotics. Blaze, Feigenbaum, and Naor gave a general definition for secure RKESs [3]. Compared to their length-preserving scheme, the ARK scheme is more efficient but satisfies the same security requirements.
منابع مشابه
Remotely Keyed Encryption Using Non-Encrypting Smart Cards
Remotely keyed encryption supports fast encryption on a slow smart card. For the scheme described here, even a smart card without a builtin encryption function, would do the job, e.g., a signature card.
متن کاملOn the Security of Remotely Keyed Encryption
The purpose of remotely keyed encryption is to eeciently realize a secret-key block cipher by sharing the computational burden between a fast untrusted device and a slow device trusted with the key. This paper deals with how to deene the security of remotely keyed en-cryption schemes. Since the attacker can take over the slow device and actually take part in the encryption process, common deeni...
متن کاملBreaking the Shin-Shin-Rhee remotely keyed encryption schemes
Remotely keyed encryption (RKE) schemes provide fast symmetric encryption and decryption using a small-bandwidth security module and a powerful host. Such schemes keep the key inside the security module to prevent key compromise. Shin, Shin, and Rhee proposed a length-preserving as well as a length-increasing RKE scheme that both use only a single round of interaction between host and security ...
متن کاملScramble All, Encrypt Small
In this paper, we propose a new design tool for “block encryption”, allowing the en/decryption of arbitrarily long messages, but performing en/decryption on only a single block (e.g., 128 bit block), where the rest of the message is only processed by a good scrambling function (e.g., one based on an ideal hash function). The design can be a component in constructing various schemes where the ab...
متن کاملA Formal Treatment of Remotely
Remotely keyed encryption schemes (RKESs), introduced by Blaze 6], support high-bandwidth cryptographic applications (such as encrypted video conferences) in which long-lived secrets (such as users' private keys) never leave lower-bandwidth environments such as secure smart-cards. We provide a formal framework in which to study the security of RKESs and give an RKES that satisses our formal sec...
متن کامل