Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode Methods and Techniques
نویسنده
چکیده
منابع مشابه
Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption
This Recommendation specifies three methods for format-preserving encryption, called FF1, FF2, and FF3. Each of these methods is a mode of operation of the AES algorithm, which is used to construct a round function within the Feistel structure for encryption.
متن کاملReport on the Second Modes of Operation Workshop (August 2001)
Morris Dworkin, a mathematician from NIST’s Computer Security Division, served as the moderator of the workshop. He welcomed the attendees and introduced the other participants from NIST: Bill Burr, Elaine Barker, Aaron Nelson, and, at the registration table, Vickie Harris and Teresa Vicente. He reviewed the three current Federal Information Processing Standards (FIPS) that establish block ciph...
متن کاملReport on the Second Modes of Operation Workshop [August 2001]
Morris Dworkin, a mathematician from NIST’s Computer Security Division, served as the moderator of the workshop. He welcomed the attendees and introduced the other participants from NIST: Bill Burr, Elaine Barker, Aaron Nelson, and, at the registration table, Vickie Harris and Teresa Vicente. He reviewed the three current Federal Information Processing Standards (FIPS) that establish block ciph...
متن کاملFRMAC, a Fast Randomized Message Authentication Code
We revisit the randomized approach followed in the design of the RMAC message authentication code in order to construct a MAC with similar properties, but based on WegmanCarter’s ε-universal hash families instead of a classical CBC chain. This yields a new message authentication code called FRMAC whose security bounds are, as in RMAC, beyond the birthday paradox limit. With efficient hash funct...
متن کاملThe Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block output under the control of a secret key K. Such “one-block-to-many” modes of operation are of frequent use in cryptology. They can be used for stream cipher encryption purposes, and for authentication and key distributio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002