Input Output Chaining (IOC) AE Mode Revisited
نویسنده
چکیده
Input Output Chaining (IOC) is an authenticated encryption (AE) mode that can be used with any block cipher. IOC main interest is that each message block is ciphered just once, as when only implementing confidentiality, while the added complexity by the accompanying integrity service is negligible. The core integrity concept in IOC is based on a novel, minimal and appealing chaining mechanism already presented by the first published IOC mode proposal [6], which so far has resisted public scrutiny. This paper upgrades some details of the former IOC specification and its security demonstration concluding that whatever resources could be spent to forge IOC integrity mechanism, assuming an ideal block cipher, the success probability of such attack will not be higher than 2-(n-1.25), where n is the cipher block size.
منابع مشابه
Chaining Distributed Gis Services
The fast development of internet technology has motivated the improvement of geographic information sharing and now, the advent of web services enable GIS functionality to be shared and consumed in a distributed computing environment. Web services are loosely-coupled functions that can be executed remotely by users on the internet regardless the platforms implemented. This concept supports the ...
متن کاملTransmission risk of two chikungunya lineages by invasive mosquito vectors from Florida and the Dominican Republic
Between 2014 and 2016 more than 3,800 imported human cases of chikungunya fever in Florida highlight the high risk for local transmission. To examine the potential for sustained local transmission of chikungunya virus (CHIKV) in Florida we tested whether local populations of Aedes aegypti and Aedes albopictus show differences in susceptibility to infection and transmission to two emergent linea...
متن کاملL4-linux Based System as a Platform for Epics Ioc-core
The EPICS Input/Output Controller (IOC) coreprogram, iocCore [1], is now portable to multiplatforms. The Linux operating system, among them, seems to be a promising candidate for a platform to run iocCore, considering the recent high appreciation in desktop and server use as well as control fields. The Linux kernel, however, is not suitable for timecritical applications, since it responds to ex...
متن کاملAnalysis of input-output clustering for determining centers of RBFN
The key point in design of radial basis function networks is to specify the number and the locations of the centers. Several heuristic hybrid learning methods, which apply a clustering algorithm for locating the centers and subsequently a linear leastsquares method for the linear weights, have been previously suggested. These hybrid methods can be put into two groups, which will be called as in...
متن کاملProtecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack
In the literature, several encryption modes of operation based on cipher block chaining (CBC) has been proven to be secure under non-adaptive chosen plaintext attack (CPA-1) in the left-or-right (LOR) or find-then-guess (FTG) security models. However, it was shown by Joux et. al. at Crypto 2002 that if we allow the adversary to perform an adaptive chosen plaintext attack (CPA-2), then CBC, ABC ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014