Eecient Error-propagating Block Chaining

نویسنده

  • Paulo Guedes
چکیده

This document presents EPBC, EEcient Error-Propagating Block Chaining, a new and eecient block encryption mode using both plaintext and ciphertext feedback. This encryption mode is similar to another one, IOBC, and was likewise designed to propagate erroneous decryptions of tampered blocks of ciphered data to all following blocks, hence allowing to validate the integrity of that data using a predeened trailing value. However, EPBC is more secure than IOBC, as it is not vulnerable to any known-plaintext attacks, and is more eecient than IOBC. Performance tests ran on a SPARCstation 10/40 show that EPBC is in average 1.2 times faster than IOBC, and 6.3 to 10.9 times faster than a common combination of an encryption mode and a one-way hash function (CBC and MD5).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Error-Propagating Block Chaining

This document presents EPBC, Efficient Error-Propagating Block Chaining, a new and efficient block encryption mode using both plaintext and ciphertext feedback. This encryption mode is similar to another one, IOBC, and was likewise designed to propagate erroneous decryptions of tampered blocks of ciphered data to all following blocks, hence allowing to validate the integrity of that data using ...

متن کامل

Correcting flaws in Mitchell's analysis of EPBC

Efficient error-Propagating Block Chaining (EPBC) is a block cipher mode intended to simultaneously provide both confidentiality and integrity protection for messages. Mitchell pointed out a weakness in EPBC and claimed that this permits a forgery attack. This paper corrects a flaw in Mitchell’s analysis and shows that the attack is no better than brute force of the integrity check vector.

متن کامل

Cryptanalysis of the EPBC Authenticated Encryption Mode

A large variety of methods for using block ciphers, so called ‘modes of operation’, have been proposed, including some designed to provide both confidentiality and integrity protection. Such modes, usually known as ‘authenticated encryption’ modes, are increasingly important given the variety of issues now known with the use of unauthenticated encryption. In this paper we show that a mode known...

متن کامل

Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm

The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy from an application to another; governmental, commercial or even cybercriminal. The infrastructure used in modern cryptography is based on public key cryptosystem. The problem is h...

متن کامل

CIPHER BLOCK CHAINING Page 1 MODIFIED FORMS OF CIPHER BLOCK CHAINING

A long-standing proposal for modifying cipher block chaining to prevent data expansion is shown to be insecure in some circumstances. Different modifications are then presented which appear secure.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007