Paper 2019/825
Plaintext Recovery Attacks against XTS Beyond Collisions
Takanori Isobe and Kazuhiko Minematsu
Abstract
XTS is an encryption scheme for storage devices standardized by IEEE and NIST. It is based on Rogaway's XEX tweakable block cipher and is known to be secure up to the collisions between the blocks, thus up to around $2^{n/2}$ blocks for $n$-bit blocks. However this only implies that the theoretical indistinguishability notion is broken with $O(2^{n/2})$ queries and does not tell the practical risk against the plaintext recovery if XTS is targeted. We show several plaintext recovery attacks against XTS beyond collisions, and evaluate their practical impacts.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. SAC 2019
- Keywords
- XTSStorage encryptionMode of operationEven-Mansour Cipher
- Contact author(s)
-
takanori isobe @ ai u-hyogo ac jp
k-minematsu @ ah jp nec com - History
- 2019-07-17: received
- Short URL
- https://ia.cr/2019/825
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/825, author = {Takanori Isobe and Kazuhiko Minematsu}, title = {Plaintext Recovery Attacks against {XTS} Beyond Collisions}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/825}, year = {2019}, url = {https://eprint.iacr.org/2019/825} }