Главная
Study mode:
on
1
Introduction
2
Block ciphers
3
Format preserving encryption
4
Typical application scenario
5
Technical challenge
6
Feistelbased schemes
7
Known plaintext attack
8
Many messages
9
Different tweaks
10
Expectations
11
Sampler
12
FPE scheme
13
FPE construction
14
Previous work
15
Question
16
Theorem
17
Dual Attack
18
Example
19
Conclusion
20
Questions
21
Discussion
Description:
Explore a conference talk on message-recovery attacks targeting Feistel-based Format Preserving Encryption (FPE) presented at the 23rd ACM Conference on Computer and Communications Security. Delve into the technical challenges of FPE, including block ciphers and typical application scenarios. Examine known plaintext attacks involving multiple messages and different tweaks. Understand the expectations, sampler, and FPE scheme construction. Learn about previous work in the field and the presenters' theorem. Investigate the dual attack approach with examples. Conclude with a discussion and Q&A session on the implications of these findings for computer security and cryptography.

Message-Recovery Attacks on Feistel-Based Format Preserving Encryption

Association for Computing Machinery (ACM)
Add to list