
AbstractNon-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to achieve. It ensures with high probability that decoded message is either completely unrelated or the original one, when tampering has no effect. Usually, standard version of non-malleable codes provide security against one time tampering attack. Block ciphers are successfully employed in the construction of non-malleable codes. Such construction fails to provide security when an adversary tampers the codeword more than once. Continuously non-malleable codes further allow an attacker to tamper the message for polynomial number of times. In this work, we propose continuous version of non-malleable codes from block ciphers in split-state model. Our construction provides security against polynomial number of tampering attacks and it preserves non-malleability. When the tampering experiment triggers self-destruct, the security of continuously non-malleable code reduces to security of the underlying leakage resilient storage.
Computer engineering. Computer hardware, Artificial intelligence, CBC-MAC, Tamper-resilient cryptography, Geometry, Set (abstract data type), Split-state model, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, Characterization and Detection of Android Malware, Theoretical computer science, Adversary, Artificial Intelligence, Computer security, Code word, FOS: Mathematics, Encoding (memory), Block Ciphers, Block cipher, Code (set theory), Chaos-based Image Encryption Techniques, Concrete security, QA75.5-76.95, Computer science, Programming language, Algorithm, Color Image Encryption, Electronic computers. Computer science, Computer Science, Physical Sciences, Signal Processing, Non-malleable code, Cryptography, Computer Vision and Pattern Recognition, Decoding methods, Block (permutation group theory), Mathematics
Computer engineering. Computer hardware, Artificial intelligence, CBC-MAC, Tamper-resilient cryptography, Geometry, Set (abstract data type), Split-state model, TK7885-7895, Cryptanalysis of Block Ciphers and Hash Functions, Characterization and Detection of Android Malware, Theoretical computer science, Adversary, Artificial Intelligence, Computer security, Code word, FOS: Mathematics, Encoding (memory), Block Ciphers, Block cipher, Code (set theory), Chaos-based Image Encryption Techniques, Concrete security, QA75.5-76.95, Computer science, Programming language, Algorithm, Color Image Encryption, Electronic computers. Computer science, Computer Science, Physical Sciences, Signal Processing, Non-malleable code, Cryptography, Computer Vision and Pattern Recognition, Decoding methods, Block (permutation group theory), Mathematics
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
