The HKC authenticated stream cipher (Ver.1)

نویسندگان

  • Matt Henricksen
  • Shinsaku Kiyomoto
  • Jiqiang Lu
چکیده

Authenticated encryption provides confidentiality and integrity in the same one-pass process, by computing a Message Authentication Code (MAC) at almost no cost over generating keystream. This is natively more efficient than providing confidentiality then authentication in separate passes. The argument as to whether compute MAC (on plaintext) then encrypt, encrypt then compute MAC (on ciphertext), or simultaneously encrypt and compute MAC (on plaintext, then encrypt plaintext and append MAC to ciphertext) was settled by Bellare and Namprempre [1] who showed that computing a MAC of the ciphertext best satisfies security properties of the typical scheme. HKC is a new stream cipher with a built in MAC routine that provides ‘encrypt then MAC’. HKC uses a 256-bit key to provide 256 bits of security. Its native environment is a processor that operates on 64-bit words, although it is also efficient in other environments. HKC is a family of Stream-Cipher-Based Authenticated Encryption algorithms. HKC’s heritage is the successful eSTREAM software portfolio cipher HC[2], designed by Hongjun Wu. HC is defined in two versions, respectively with 128and 256-bit keys, although only the former is included in the eSTREAM portfolio. HKC is based upon HC-256 to incorporate a MAC, to take advantage of larger register sizes on modern processors, and to remove or diminish what HKC’s authors perceive as inefficiencies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

CryptMT Stream Cipher Ver . 3 : Description ?

CryptMT Version 3 (CryptMT3) is a stream cipher obtained by combining a large LFSR and a nonlinear filter with memory using integer multiplication. Its period is proved to be no less than 219937−1, and the 8-bit output sequence is at least 1241-dimensionally equidistributed. It is one of the fastest stream ciphers on a CPU with SIMD operations, such as Intel Core 2 Duo.

متن کامل

Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

This paper is primarily concerned with the CBC block cipher mode. The impact on the usability of this mode of recently proposed padding oracle attacks, together with other related attacks described in this paper, is considered. For applications where unauthenticated encryption is required, the use of CBC mode is compared with its major symmetric rival, namely the stream cipher. It is argued tha...

متن کامل

TriviA: A Fast and Secure Authenticated Encryption Scheme

In this paper, we propose a new hardware friendly authenticated encryption (AE) scheme TriviA based on (i) a stream cipher for generating keys for the ciphertext and the tag, and (ii) a pairwise independent hash to compute the tag. We have adopted one of the ISOstandardized stream ciphers for lightweight cryptography, namely Trivium, to obtain our underlying stream cipher. This new stream ciphe...

متن کامل

Tail-MAC: A Message Authentication Scheme for Stream Ciphers

Tail-MAC, A predecessor to the VMPC-MAC, algorithm for computing Message Authentication Codes for stream ciphers is described along with the analysis of its security. The proposed algorithm was designed to employ some of the data already computed by the underlying stream cipher in the purpose of minimizing the computational cost of the operations required by the MAC algorithm. The performed ana...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014