Some properties of the DEC mode of operation of block ciphers
Matematičeskie voprosy kriptografii, Tome 13 (2022) no. 3, pp. 37-44 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

In 2021 Technical Committee for Standardization «Cryptography and security Mechanisms» adopted new methodological recommendations, describing the mode of operation for full disk encryption (hereinafter referred to as the DEC mode). This mode is a modification of the CTR mode and takes into account the operating conditions and some features of block-oriented data carriers. In this paper, the cryptographic characteristics of the DEC mode, such as the bound on the number of partition keys generated and the collision probability for the keystream used for sector encryption, are investigated.
@article{MVK_2022_13_3_a1,
     author = {D. S. Bogdanov and V. I. Nozdrunov},
     title = {Some properties of the {DEC} mode of operation of block ciphers},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {37--44},
     year = {2022},
     volume = {13},
     number = {3},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/MVK_2022_13_3_a1/}
}
TY  - JOUR
AU  - D. S. Bogdanov
AU  - V. I. Nozdrunov
TI  - Some properties of the DEC mode of operation of block ciphers
JO  - Matematičeskie voprosy kriptografii
PY  - 2022
SP  - 37
EP  - 44
VL  - 13
IS  - 3
UR  - http://geodesic.mathdoc.fr/item/MVK_2022_13_3_a1/
LA  - en
ID  - MVK_2022_13_3_a1
ER  - 
%0 Journal Article
%A D. S. Bogdanov
%A V. I. Nozdrunov
%T Some properties of the DEC mode of operation of block ciphers
%J Matematičeskie voprosy kriptografii
%D 2022
%P 37-44
%V 13
%N 3
%U http://geodesic.mathdoc.fr/item/MVK_2022_13_3_a1/
%G en
%F MVK_2022_13_3_a1
D. S. Bogdanov; V. I. Nozdrunov. Some properties of the DEC mode of operation of block ciphers. Matematičeskie voprosy kriptografii, Tome 13 (2022) no. 3, pp. 37-44. http://geodesic.mathdoc.fr/item/MVK_2022_13_3_a1/

[1] Shishkin V.A., Lavrikov I.V., Marshalko G.B., Rudskoy V.I., Mechanisms of derivative key generation. Results of cryptographic research and justification for cryptographic qualities, TC 26, M., 2017 (in Russian)

[2] Gorelov M.A., Simple optimization problems. Non-algebraic transformations, Dorodnicyn Computing Centre of RAS, M., 2012, 63 pp. (in Russian)

[3] GOST P 34.12–2015. Information technology. Cryptographic data security. Block ciphers, Standardinform, M., 2015 (in Russian)

[4] GOST P 34.13–2015. Information technology. Cryptographic protection of information. Modes of operation of block ciphers, Standardinform, M., 2016 (in Russian)

[5] Recommendations for standardisation P 1323565.1.022-2018. Information technology. Cryptographic protection of information. Key derivation function, Standardinform, M., 2018 (in Russian)

[6] Methodological recommendations MP 26.2.005-2001. Block ciphers mode of operation designed to protect of data storage medium with a block-oriented structure, TC 26, M., 2021 (in Russian)

[7] Damgård I., Nielsen J.B., “Expanding pseudorandom functions; or: from known-plaintext security to chosen-plaintext security”, CRYPTO 2002, Lect. Notes Comput. Sci., 2442, 2002, 449–464 | DOI | MR

[8] Iwata T., Kurosawa K., “OMAC: One-Key CBC MAC”, FSE 2003, Lect. Notes Comput. Sci., 2887, 2003, 129–153 | DOI | MR