Authenticated encryption mode with blocks skipping

نویسندگان

چکیده

Block symmetric ciphers are one of the most important components modern information security systems. At same time, in addition to structure applied block cipher, cryptographic strength and performance protection system is largely determined by encryption mode. In high high-quality destruction statistics, modes should also protect encrypted from occurred or intentionally introduced errors. this paper, we have developed an mode with blocks skipping using a pseudo-random key sequence generator, which allows checking integrity accurate detection place where error was introduced. case, accuracy adjustable parameter macroblock size can be set depending on level importance protected information. The characterized following advantages: reducing number required operations half, while providing quality; more effective statistics due use additional generator sequences, impossibility propagation (intentionally introduced) outside macroblock, as well higher values levels possibility classifying initial states generators sequences. As proposed authenticated recommended for mobile platforms that demanding both terms quality reliability limited computing power resources.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The AEM Authenticated-Encryption Mode

This note specifies AEM, a mode of operation giving authenticated encryption. AEM is a refinement to Rogaway, Bellare, and Black’s OCB mode [10], while OCB was, in turn, a refinement to Jutla’s IAPM [5]. AEM is also a successor to the work of Gligor and Donescu’s [4] and to the broader line of research that has defined and investigated authenticated encryption [1, 2, 6–8]. The acronym AEM stand...

متن کامل

A Conventional Authenticated-Encryption Mode

We propose a block-cipher mode of operation, EAX, for authenticated-encryption with associateddata (AEAD). Given a nonce N , a message M , and a header H, the mode protects the privacy of M and the authenticity of both M and H. Strings N, M, H E {0, 1} are arbitrary, and the mode uses 2→M/n∈ + →H/n∈ + →N/n∈ block-cipher calls when these strings are nonempty and n is the block length of the unde...

متن کامل

Authenticated Encryption Mode of VEST Ciphers

This paper demonstrates operation of the authenticated encryption mode in VEST ciphers. All VEST ciphers operating in the authenticated encryption mode with infinite error propagation provide keyed message authentication at the same speed as their keystream generation, with negligible overhead and maintaining their security ratings.

متن کامل

Analysing the IOBC Authenticated Encryption Mode

The idea of combining a very simple form of added plaintext redundancy with a special mode of data encryption to provide data integrity is an old one; however, despite its wide deployment in protocols such as Kerberos, it has largely been superseded by provably secure authenticated encryption techniques. In this paper we cryptanalyse a block cipher mode of operation called IOBC, possibly the on...

متن کامل

Cryptanalysis of the EPBC Authenticated Encryption Mode

A large variety of methods for using block ciphers, so called ‘modes of operation’, have been proposed, including some designed to provide both confidentiality and integrity protection. Such modes, usually known as ‘authenticated encryption’ modes, are increasingly important given the variety of issues now known with the use of unauthenticated encryption. In this paper we show that a mode known...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sistemnyj Analiz i Prikladnaâ Informatika

سال: 2021

ISSN: ['2414-0481', '2309-4923']

DOI: https://doi.org/10.21122/2309-4923-2021-3-59-65