The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency)

نویسندگان

  • P. ROGAWAY
  • D. WAGNER
چکیده

We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryptionwith associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects theprivacy of M and the authenticity of both M and H . Strings N , M , and H are arbitrary bit strings, andthe mode uses 2 |M |/n + |H|/n + |N |/n block-cipher calls when these strings are nonempty and nis the block length of the underlying block cipher. Among EAX’s characteristics are that it is on-line (thelength of a message isn’t needed to begin processing it) and a fixed header can be pre-processed, effectivelyremoving the per-message cost of binding it to the ciphertext.EAX is obtained by first creating a generic-composition method, EAX2, and then collapsing its two keysinto one. EAX is provably secure under a standard complexity-theoretic assumption. The proof of this factis novel and involved.EAX is an alternative to CCM [26], which was created to answer the wish within standards bodies for afully-specified and patent-free AEAD mode. As such, CCM and EAX are two-pass schemes, with one passfor achieving privacy and one for authenticity. EAX is simpler and more efficient than CCM, avoiding, forexample, elaborate padding rules or nonstandard parameters. With EAX we aimed to do as well as possible,within the space of two-pass schemes, with regard to issues of efficiency, simplicity, elegance, ease of correctuse, and provable-security guarantees.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Ef£ciency)

We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryptionwith associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects theprivacy of M and the authenticity of both M and H . Strings N , M , and H are arbitrary bit strings, andthe mode uses 2d|M |/ne + d|H|/ne + d|N |/ne block-cipher calls when these string...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

The Efficiency of Encryption Algorithms in EAX Moder of Operation in IPSEC-based Virtual Private Networks for Streaming Rich Multimedia Data

The characteristics of encryption/decryption algorithms (ciphers) and modes of their operation (modes) have significant influence on security and performance of computer networks. The common modes of cipher operation such as ECB, CBC, OFB, CFB, CTR and XTS provide various levels of data confidentiality; however, those modes do not provide integrity and authenticity of encrypted data, and, there...

متن کامل

A Conventional Authenticated-Encryption Mode

We propose a block-cipher mode of operation, EAX, for authenticated-encryption with associateddata (AEAD). Given a nonce N , a message M , and a header H, the mode protects the privacy of M and the authenticity of both M and H. Strings N, M, H E {0, 1} are arbitrary, and the mode uses 2→M/n∈ + →H/n∈ + →N/n∈ block-cipher calls when these strings are nonempty and n is the block length of the unde...

متن کامل

Survey of the EAX mode of operation

This report is a survey of the authenticated encryption mode EAX proposed M. Bellare, P. Rogaway, D. Wagner [1] ; Definitions, theorems and proofs has been slighty changed to make them more similar to the framework of the course. The definitions in Stinson [7] , and the definitions of oracle proofs in the lecture notes by Ivan Bjerre Damgaard[3][4]. This is done to meet the formal requirement o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004