Survey of the EAX mode of operation

نویسنده

  • Kasper Borup
چکیده

This report is a survey of the authenticated encryption mode EAX proposed M. Bellare, P. Rogaway, D. Wagner [1] ; Definitions, theorems and proofs has been slighty changed to make them more similar to the framework of the course. The definitions in Stinson [7] , and the definitions of oracle proofs in the lecture notes by Ivan Bjerre Damgaard[3][4]. This is done to meet the formal requirement of the exam; That the reports should be readable by the other students.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Authenticity Bound of EAX, and Refinements

EAX is a mode of operation for blockciphers to implement an authenticated encryption. The original paper of EAX proved that EAX is unforgeable up to O(2) data with one verification query. However, this generally guarantees a rather weak bound for the unforgeability under multiple verification queries, i.e., only (2) data is acceptable. This paper provides an improvement over the previous securi...

متن کامل

The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency)

We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryptionwith associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects theprivacy of M and the authenticity of both M and H . Strings N , M , and H are arbitrary bit strings, andthe mode uses 2 |M |/n + |H|/n + |N |/n block-cipher calls when these strings are...

متن کامل

The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Ef£ciency)

We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryptionwith associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects theprivacy of M and the authenticity of both M and H . Strings N , M , and H are arbitrary bit strings, andthe mode uses 2d|M |/ne + d|H|/ne + d|N |/ne block-cipher calls when these string...

متن کامل

A Conventional Authenticated-Encryption Mode

We propose a block-cipher mode of operation, EAX, for authenticated-encryption with associateddata (AEAD). Given a nonce N , a message M , and a header H, the mode protects the privacy of M and the authenticity of both M and H. Strings N, M, H E {0, 1} are arbitrary, and the mode uses 2→M/n∈ + →H/n∈ + →N/n∈ block-cipher calls when these strings are nonempty and n is the block length of the unde...

متن کامل

The EAX Mode of Operation

We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects the privacy of M and the authenticity of bothM andH . StringsN ,M , andH are arbitrary bit strings, and the mode uses 2djM j=ne + djHj=ne + djN j=ne block-cipher calls when these strings are nonempty...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009