Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Processing encrypted data
Ahituv N., Lapid Y., Neumann S. Communications of the ACM30 (9):777-780,1987.Type:Article
Date Reviewed: Dec 1 1988

In this paper the authors consider several means of encrypting data so that arithmetic operations can be performed on the data without decryption. They limit themselves to cases in which the operation performed on both plaintext and ciphertext is integer modular addition. For this reason, they are limited to encryption algorithms that are either affine or linear functions or compositions thereof. This causes difficulties, because if the key is not changed with every encryption, the algorithms can be broken by discovery of a very small number of plaintext-ciphertext pairs, while if the key is changed with every encryption, the cost and risks of key management may become prohibitive because a different key is needed for each data item as well as for each update. These difficulties are noted by the authors.

It should be emphasized that many of the problems described by the authors may be avoided by choosing an encryption function so that the operation performed on the ciphertext is something other than modular addition. Thus this paper, while it presents an adequate discussion of a certain aspect of the subject, should not be taken as the final word on the feasibility of processing encrypted data.

This paper is full of misprints and misleading notation that make it hard to understand. Most notable are the following. Wherever fk(P1,P2) appears, it should be replaced by fk(P1 + P2). In the second equation in section 2.2, fk−1(C1 + C2) should be replaced by fk−1(C1 + P2). In section 4.2, fk1 through fk64 should be replaced by fk1−1 through fk64−1. In section 4.2, the second appearance of Mi should be replaced by P1.

Reviewer:  Catherine Meadows Review #: CR112270
Bookmark and Share
 
Data Encryption Standard (DES) (E.3 ... )
 
 
Public Key Cryptosystems (E.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption Standard (DES)": Date
Cycle structure of the DES for keys having palindromic (or antipalindromic) sequences of round keys
Moore J., Simmons G. IEEE Transactions on Software Engineering SE-13(2): 262-273, 1987. Type: Article
Feb 1 1988
A randomized protocol for signing contracts
Even S., Goldreich O., Lempel A. Communications of the ACM 28(6): 637-647, 1985. Type: Article
Dec 1 1985
Differential cryptanalysis of the data encryption standard
Biham E., Shamir A., Springer-Verlag, London, UK, 1993. Type: Book (9780387979304)
Feb 1 1994
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy