[Resource Topic] 2019/825: Plaintext Recovery Attacks against XTS Beyond Collisions

Welcome to the resource topic for 2019/825

Title:
Plaintext Recovery Attacks against XTS Beyond Collisions

Authors: Takanori Isobe, Kazuhiko Minematsu

Abstract:

XTS is an encryption scheme for storage devices standardized by IEEE and NIST. It is based on Rogaway’s XEX tweakable block cipher and is known to be secure up to the collisions between the blocks, thus up to around 2^{n/2} blocks for n-bit blocks. However this only implies that the theoretical indistinguishability notion is broken with O(2^{n/2}) queries and does not tell the practical risk against the plaintext recovery if XTS is targeted. We show several plaintext recovery attacks against XTS beyond collisions, and evaluate their practical impacts.

ePrint: https://eprint.iacr.org/2019/825

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .