--
Ben Laurie wrote:
> I'm implementing AES in IGE and biIGE mode. AFAIK,
> there are no other implementations or test vectors,
> but perhaps one of you knows different?

 On reviewing the various methods for providing
integrity with minimal overhead for block encrypted
data, IGE seemed comprehensible, and I found no reported
attacks against it, but I also encountered lots of
literature adding multitudes of epicycles to it, as if
weaknesses had been found or suspected.

I expected to find someone saying "Here is a simple and
efficient way to protect encrypted data against
malicious alteration by an adversary who knows or
strongly suspects the plaintext" but did not find anyone
saying that.

Why the oversupply of remedies?

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     PPq8l9FHjabhO8nTB28VyFfiMXCf9NJ+pa+2HT1q
     4Ttu2nqimJg3wjiGx+UTZHFcnKnoRe83ZkbkrSUY0

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to