File tree Expand file tree Collapse file tree 1 file changed +5
-4
lines changed Expand file tree Collapse file tree 1 file changed +5
-4
lines changed Original file line number Diff line number Diff line change @@ -1603,10 +1603,11 @@ effectively random.
1603
1603
All the AEAD functions used meet indistinguishability under (adaptive) chosen
1604
1604
plaintext attack (IND-CPA, IND-CPA2) goals and produce minimal expansion of the
1605
1605
plaintext, adding only an authentication tag. Therefore, this document assumes
1606
- that the sampled AEAD output is unpredictable and not subject to influence by an
1607
- attacker. Based on this assumption, the odds of producing identical input to a
1608
- packet protection algorithm approach the birthday bound on the size of the input
1609
- (that is, one divided by the square root of the number of possible values).
1606
+ that each bit of sampled AEAD output contains one bit of entropy and that an
1607
+ attacker is unable to reduce this without knowledge of the key. Based on this
1608
+ assumption, the odds of producing identical input to a packet protection
1609
+ algorithm approach the birthday bound on the size of the input (that is, one
1610
+ divided by the square root of the number of possible values).
1610
1611
1611
1612
Note :
1612
1613
You can’t perform that action at this time.
0 commit comments