6

I've read "A Parallelizable Enciphering Mode" by Halevi and Rogaway about the encrypt-mix-encrypt mode for ciphers and was asking myself if this mode provides "full" diffusion.

So if an attacker alters one bit of the ciphertext, how many bits (all?) get scrambled on decryption? (if using AES and blocks of size 4096 bits (drive sector size))

Or in other words: Does this mode turns a "narrow" block cipher into a "wide" cipher and hence would be a perfect choice for full-disk encryption (FDE)?

otus
  • 32,132
  • 5
  • 70
  • 165
SEJPM
  • 45,967
  • 7
  • 99
  • 205

2 Answers2

5

Yes, EME is a wideblock cipher. Theorem 1 (in Section 4, top of page 5) states that EME is secure as a wideblock (tweakable) cipher under the assumption that AES (or whatever blockcipher you use) is secure.

Specifically, to someone who doesn't know the key, EME will look like a set of random, independent permutations (one for each tweak). This is true even if the attacker can both encrypt and decrypt whatever they wish. This in turn implies that all the bits get scrambled upon decryption if a single ciphertext bit is corrupted. (The definition at the bottom of page two captures these ideas, and then Theorem 1 states that EME meets this definition).

Seth
  • 4,378
  • 23
  • 28
  • you've got any idea why this isn't deployed for disk-encryption then? – SEJPM May 23 '15 at 19:22
  • 2
    There were originally some patent issues (which may or may not have been resolved since, I haven't seen anything definitive). Additionally, EME requires two blockcipher calls per block of input, which slows performance. – Seth May 23 '15 at 19:25
  • a single encrypt between that. Not a problem for disk encryption but if the resulting block size is small then you may still have an issue.
  • – Maarten Bodewes Jun 18 '15 at 20:58