All-or-nothing transform
In
Algorithms
The original AONT, the package transform, was described by
Although Rivest's paper only gave a detailed description of the package transform as it applies to
In 1999 Victor Boyko proposed another AONT, provably secure under the
Apparently at about the same time, D. R. Stinson proposed a different implementation of AONT, without any cryptographic assumptions.[3] This implementation is a linear transform, perhaps highlighting some security weakness of the original definition.
Applications
AONTs can be used to increase the strength of encryption without increasing the key size. This may be useful to, for example, secure secrets while complying with government cryptography export regulations. AONTs help prevent several attacks.
One of the ways AONTs improve the strength of encryption is by preventing attacks which reveal only part of the information from revealing anything, as the partial information is not enough to recover any of the original message.
Another application, suggested in the original papers is to reduce the cost of security: for example, a file can be processed by AONT, and then only a small portion of it can be encrypted (e.g., on a smart-card). AONT will assure that as a result the whole file is protected. It is important to use the stronger version of the transform (such as the one by Boyko above).
AONT may be combined with
Other uses of AONT can be found in optimal asymmetric encryption padding (OAEP).
References
- ^ ISBN 978-3-540-66347-8.
- ISBN 978-3-540-63247-4.
- S2CID 10118200.
- ^ Resch, Jason; Plank, James (February 15, 2011). AONT-RS: Blending Security and Performance in Dispersed Storage Systems (PDF). Usenix FAST'11.
External links
- Staple, an open-source prototype All-or-nothing transform implementation.