Cryptographic Applications of the Duplex Construction

نویسنده

  • Mariusz Borowski
چکیده

Assured security is the desirable feature of modern cryptography. Most of modern cryptography primitives have no provably secure constructions. Their safety is defined on the basis of well-known in the given time cryptanalytic attacks. The duplex construction equipped with one ideal permutation and appropriate security parameters is suitable for building provably secure cryptographic primitives. The constructions can be used for unclassified information of different sensitivity levels protection. Some of them can secure classified information up to the “TOP SECRET” level. The applications based on the duplex construction can be used for key wrapping, authenticated encryption and can work as a pseudo-random bit sequence generator. They are not covered by any known intellectual property.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Effect of Thermomechanical Processing on the Microstructure and Mechanical Properties of a Duplex Stainless Steel

Duplex stainless steels (DSSS) have a microstructure composed of ferrite and austenite phases that gives them a very good combination of mechanical and corrosion properties. These steels are desirable for many applications in the chemical and petrochemical industries. In the present study, a type of stainless steel was cast, solution annealed at 1200°C for 60 min and then quenched in water. Ini...

متن کامل

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation

BLINKER is a light-weight cryptographic suite and record protocol built from a single permutation. Its design is based on the Sponge construction used by the SHA-3 algorithm KECCAK. We examine the SpongeWrap authenticated encryption mode and expand its padding mechanism to offer explicit domain separation and enhanced security for our specific requirements: shared secret half-duplex keying, enc...

متن کامل

sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives

In this paper, we propose a family of lightweight cryptographic permutations called sLiSCP, with the sole aim to provide a realistic minimal design that suits a variety of lightweight device applications. More precisely, we argue that for such devices the chip area dedicated for security purposes should, not only be consumed by an encryption or hashing algorithm, but also provide as many crypto...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Annales UMCS, Informatica

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2014