CWC: A High-Performance Conventional Authenticated Encryption Mode

نویسندگان

  • Tadayoshi Kohno
  • John Viega
  • Doug Whiting
چکیده

We introduce CWC, a new block cipher mode of operation for protecting both the privacyand the authenticity of encapsulated data. CWC is currently the only such mode having all fiveof the following properties: provable security, parallelizability, high performance in hardware,high performance in software, and no intellectual property concerns. We believe that havingall five of these properties makes CWC a powerful tool for use in many performance-criticalcryptographic applications. CWC is also the only appropriate solution for some applications;e.g., standardization bodies like the IETF and NIST prefer patent-free modes, and CWC is theonly such mode capable of processing data at 10Gbps in hardware, which will be importantfor future IPsec (and other) network devices. As part of our design, we also introduce a newparallelizable universal hash function optimized for performance in both hardware and software.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticated Encryption Modes of Block Ciphers, Their Security and Implementation Properties

In this thesis, four authenticated encryption modes of operation are presented, namely, GCM mode, CCM* mode, OCB mode and CWC mode. These modes can provide confidentiality and authenticity simultaneously. The GCM mode and CCM* mode are in detail introduced. And it shows the comparison of the four modes from different aspects: properties, security, and performance in hardware implementation and ...

متن کامل

Basic comparison of Modes for Authenticated - Encryption ( IAPM , XCBC , OCB , CCM , EAX , CWC , GCM , PCFB , CS )

An authentication-encryption (AE) scheme is an encryption scheme with a pre-shared key providing both data privacy and authenticity. Basic AE scheme can be constructed by a naive (serial) combination of some existing encryption mode together with a message authentication code (MAC). The computation cost of such approach equals to cost of the encryption plus the cost of the MAC. There are severa...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Reforgeability of Authenticated Encryption Schemes

This work pursues the idea of multi-forgery attacks as introduced by Ferguson in 2002. We recoin reforgeability for the complexity of obtaining further forgeries once a first forgery has succeeded. First, we introduce a security notion for the integrity (in terms of reforgeability) of authenticated encryption schemes: j-Int-CTXT, which is derived from the notion INT-CTXT. Second, we define an a...

متن کامل

On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices

Widespread use of pervasive devices has resulted in security problems which can not be solved by conventional algorithms and approaches. These devices are not only extremely resourceconstrained, but most of them also require high performance – with respect to available resources – in terms of security, speed and latency. Especially for authenticated encryption, such performance can not be achie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003