{"created":"2025-01-18T23:11:08.591597+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00045128","sets":["1164:3925:3956:3958"]},"path":["3958"],"owner":"1","recid":"45128","title":["ブロック暗号における秘密鍵の平文ブロックのマスクについて2 - key XCBCによるMAC生成スキームの安全性"],"pubdate":{"attribute_name":"公開日","attribute_value":"2002-07-18"},"_buckets":{"deposit":"9d487086-102d-4a91-abb3-48f5a3e70655"},"_deposit":{"id":"45128","pid":{"type":"depid","value":"45128","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"ブロック暗号における秘密鍵の平文ブロックのマスクについて2 - key XCBCによるMAC生成スキームの安全性","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ブロック暗号における秘密鍵の平文ブロックのマスクについて2 - key XCBCによるMAC生成スキームの安全性"},{"subitem_title":"Risks for Raw - key Masking the Security of 2 - key XCBC MAC - generation scheme","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2002-07-18","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"(株)日立製作所システム科学研究所"},{"subitem_text_value":"九州大学大学院システム情報科学研究院"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Hitachi, Systems Development Laboratory","subitem_text_language":"en"},{"subitem_text_value":"Dept. of CSCE.,Kyushu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/45128/files/IPSJ-CSEC02018028.pdf"},"date":[{"dateType":"Available","dateValue":"2004-07-18"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC02018028.pdf","filesize":[{"value":"1.4 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"1be94567-1631-4403-8586-fab4985641c6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2002 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"古屋, 聡一"},{"creatorName":"櫻井, 幸一"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Soichi, Furuya","creatorNameLang":"en"},{"creatorName":"Kouichi, Sakurai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"2-key XCBCは盛合今井が提案した CBC-MACに基づくMAC生成手法である。この方式は 秘密PRPの呼出回数 鍵セットアップ回数 鍵資源の数の観点からもっとも効率的な手法であり、また呼び出す秘密PRPの安全性に基づいてMACとしての安全性が証明されている.本稿では、2key XCBCの本質である、秘密鍵を平文にマスクすること、の安全性への影響について議論する.PRPが特別な置換に限定される場合として Even-Mansour構築を使ったある2-key XCBCの例では攻撃者が改竄可能であることを示す.また2-key XCBCにDESX constructionを使った例では このスキームを攻撃するのに必要な計算量が DESXが証明する安全性の下限を下回ることを示す.さらに別の観点からの安全性の評価として 2-key XCBCをAESやCamelliaに用いた場合の安全性についても議論する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Two-key XCBC proposed by Moriai and Imai is a CBCMAC-based method to generate a message authentication code. This method is optimal from several aspects, the number of PRP invocations, key setups, and key materials. This mode is alsp proven the security as a MAC. In this paper, we discuss how masking a secret key for a plaintext block effects to its security. Concerning that the PRP is limited to the special permutations,we show the two-key XCBC is forgeable if one uses Even-Mansour constructions. In case of using DESX construction for two-key XCBC, the necesarry complexity to attack the scheme is below that what is proven for DESX. We also study the security of AES and Camellia when they are used in two-key XCBC mode from another aspect, rather than the context of the provable security.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"196","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"189","bibliographicIssueDates":{"bibliographicIssueDate":"2002-07-18","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"68(2002-CSEC-018)","bibliographicVolumeNumber":"2002"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"links":{},"id":45128,"updated":"2025-01-22T10:08:22.732900+00:00"}