The Extended Codebook (XCB) Mode of Operation
نویسندگان
چکیده
We describe a block cipher mode of operation that implements a ‘tweakable’ (super) pseudorandom permutation with an arbitrary block length. This mode can be used to provide the best possible security in systems that cannot allow data expansion, such as disk-block encryption and some network protocols. The mode accepts an additional input, which can be used to protect against attacks that manipulate the ciphertext by rearranging the ciphertext blocks. Our mode is similar to a five-round Luby-Rackoff cipher in which the first and last rounds do not use the conventional Feistel structure, but instead use a single block cipher invocation. The third round is a Feistel structure using counter mode as a PRF. The second and fourth rounds are Feistel structures using a universal hash function; we re-use the polynomial hash over a binary field defined in the Galois/Counter Mode (GCM) of operation for block ciphers. This choice provides efficiency in both hardware and software and allows for re-use of implementation effort. XCB also has several useful properties: it accepts arbitrarily-sized plaintexts and associated data, including any plaintexts with lengths that are no smaller than the width of the block cipher. This document is a pre-publication draft manuscript.
منابع مشابه
The Security of the Extended Codebook (XCB) Mode of Operation
The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide a proof of security for XCB, and show that it is a secure tweakable (super) pseudorandom permutation. Our analysis makes several new contributions: it uses an algebraic property of XCB’s internal universal hash function to simp...
متن کاملSome issues on Security
Tweakable Enciphering Schemes (TES) are a block cipher mode of operation which can be suitable used for the application of in-place disk encryption. There have been lot of activities in designing secure TES in the last few years. IEEE has also formulated a standard (IEEE Std 1619.2-2010) which specifies two TES for the application of block oriented storage media. In this thesis we deal with two...
متن کاملAn Efficient SPRP-secure Construction based on Pseudo Random Involution
Here we present a new security notion called as pseudo random involution or PRI which are associated with tweakable involution enciphering schemes or TIES (i.e., the encryption and decryption are same algorithm). This new security notion is important in two reasons. Firstly, it is the natural security notion for TIES which are having practical importance. Secondly, we show that there is a gener...
متن کاملReal-time Mode Hopping of Block Cipher Algorithms for Mobile Streaming
It has been shown that the encrypted information or ciphertext produced by symmetric-key block ciphers with Electronic codebook mode is vulnerable to ciphertext searching, replay, insertion and deletion because it encrypts each block independently. To compensate for this, each block of the encrypted information should be encrypted dependently. The encrypted information should be operated with a...
متن کاملOptimizing the Block Cipher Resource Overhead at the Link Layer Security Framework in the Wireless Sensor Networks
The security requirements in Wireless Sensor Networks (WSNs) and the mechanisms to support the requirements, demand a critical examination. Therefore, the security protocols employed in WSNs should be so designed, as to yield the optimum performance. The efficiency of the block cipher is, one of the important factors in leveraging the performance of any security protocol. In this paper, therefo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2004 شماره
صفحات -
تاریخ انتشار 2004