نتایج جستجو برای: authenticated cipher

تعداد نتایج: 16348  

Journal: :IACR Cryptology ePrint Archive 2015
Kazuhiko Minematsu Tetsu Iwata

Tweakable blockcipher (TBC) is an extension of standard blockcipher introduced by Liskov, Rivest and Wagner in 2002. TBC is a versatile building block for efficient symmetric-key cryptographic functions, such as authenticated encryption. In this paper we study the problem of extending tweak of a given TBC of fixed-length tweak, which is a variant of popular problem of converting a blockcipher i...

2014
Jérémy Jean Ivica Nikolic Thomas Peyrin

We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with arbitrary tweak and key sizes, given the public round permutation (for instance, the AES round). Increasing the sizes renders the security analysis ...

2004
Phillip Rogaway

We describe highly efficient constructions, XE and XEX, that turn a blockcipher E: K×{0, 1} → {0, 1} into a tweakable blockcipher e E: K×T ×{0, 1} → {0, 1} having tweak space T = {0, 1}× I where I is a set of tuples of integers such as I = [1 .. 2]× [0 .. 10]. When tweak T is obtained from tweak S by incrementing one if its numerical components, the cost to compute e E K(M) having already compu...

2013
Kazuhiko Minematsu Stefan Lucks Tetsu Iwata

EAX is a mode of operation for blockciphers to implement an authenticated encryption. The original paper of EAX proved that EAX is unforgeable up to O(2) data with one verification query. However, this generally guarantees a rather weak bound for the unforgeability under multiple verification queries, i.e., only (2) data is acceptable. This paper provides an improvement over the previous securi...

Journal: :IACR Cryptology ePrint Archive 2017
Mustafa Khairallah Anupam Chattopadhyay Thomas Peyrin

In this paper, we investigate the efficiency of FPGA implementations of AES and AES-like ciphers, specially in the context of authenticated encryption. We consider the encryption/decryption and the authentication/verification structures of OCB-like modes (like OTR or SCT modes). Their main advantage is that they are fully parallelisable. While this feature has already been used to increase the ...

2015
Jérémy Jean Yu Sasaki Lei Wang

In this paper, we present the first third-party cryptanalysis against the authenticated encryption scheme Silver. In high-level, Silver builds a tweakable block cipher by tweaking AES-128 with a dedicated method and performs a similar computation as OCB3 to achieve 128bit security for both of integrity and confidentiality in nonce-respecting model. Besides, by modifying the tag generation of OC...

2013
Guido Bertoni Joan Daemen Michaël Peeters Gilles Van Assche

This concluded an open competition that was remarkable both for its magnitude and the involvement of the cryptographic community. Public review is of paramount importance to increase the confidence in the new standard and to favor its quick adoption. The SHA-3 competition explicitly took this into account by giving open access to the candidate algorithms and everyone in the cryptographic commun...

Journal: :Advanced Computing: An International Journal 2012

Journal: :IACR Cryptology ePrint Archive 2014
Xiutao Feng Fan Zhang Hui Wang

PANDA is a family of authenticated ciphers submitted to CARSAR, which consists of two ciphers: PANDA-s and PANDA-b. In this work we present a state recovery attack against PANDA-s with time complexity about 2 under the known-plaintext-attack model, which needs 137 pairs of known plaintext/ciphertext and about 2GB memories. Our attack is practical in a small workstation. Based on the above attac...

Journal: :ti< 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید