نتایج جستجو برای: authenticated cipher

تعداد نتایج: 16348  

2009
Hequn Chen Axel Poschmann

In this thesis, four authenticated encryption modes of operation are presented, namely, GCM mode, CCM* mode, OCB mode and CWC mode. These modes can provide confidentiality and authenticity simultaneously. The GCM mode and CCM* mode are in detail introduced. And it shows the comparison of the four modes from different aspects: properties, security, and performance in hardware implementation and ...

Journal: :IACR Cryptology ePrint Archive 2016
Francesco Berti François Koeune Olivier Pereira Thomas Peters François-Xavier Standaert

Leakage-resilience and misuse-resistance are two important properties for the deployment of authenticated encryption schemes. They aim at mitigating the impact of implementation flaws due to side-channel leakages and misused randomness. In this paper, we discuss their interactions and incompatibilities. For this purpose, we first show a generic composition mode of a MAC with an encryption schem...

Journal: :IACR Cryptology ePrint Archive 2005

This paper demonstrates operation of the authenticated encryption mode in VEST ciphers. All VEST ciphers operating in the authenticated encryption mode with infinite error propagation provide keyed message authentication at the same speed as their keystream generation, with negligible overhead and maintaining their security ratings.

2016
Asli Bay Oguzhan Ersoy Ferhat Karakoç

In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide misuse resistant against forgeries and security against blockwise adaptive adversaries as well as 128-bit security against key recovery attacks. We scrutinize ElmD in such a way that we provide uni...

Journal: :IACR Cryptology ePrint Archive 2007
Benjamin Gittins Howard A. Landman

VEST is a set of four stream cipher families targeted to semiconductor applications. All VEST family members support efficient encryption, single pass authenticated encryption, and collision resistant hashing in the one low area module. VEST was submitted by Synaptic Laboratories Ltd. to the ECRYPT NoE eSTREAM project in 2005. Recently, a single digit typographical error was identified in the V...

2007
Chris J. Mitchell

A large variety of methods for using block ciphers, so called ‘modes of operation’, have been proposed, including some designed to provide both confidentiality and integrity protection. Such modes, usually known as ‘authenticated encryption’ modes, are increasingly important given the variety of issues now known with the use of unauthenticated encryption. In this paper we show that a mode known...

2009
Cíntia B. Margi Bruno T. de Oliveira Gustavo T. de Sousa Marcos A. Simplicio Flávio H. Freitas Paulo S. L. M. Barreto Tereza C. M. B. Carvalho Mats Näslund Richard Gold

The deployment of security solutions in Wireless Sensor Networks (WSNs) is considered a challenge due to the highly constrained devices involved in these applications. However, due the need for security services such as confidentiality, integrity and authenticity in a large number of important scenarios, such mechanisms are made necessary. In this demonstration paper, we show that deployment of...

2015
Thomas Fuhr Gaëtan Leurent Valentin Suder

In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook). These algorithms use secret offsets (masks derived from a whitening key) to turn a block cipher into a tweakable block cipher, following the XE or XEX construction. OCB has a security proof up to 2 queries, and a matching forgery attack was described by Ferguson, where the main step of the att...

Journal: :Iet Information Security 2022

Deoxys-BC is the internal tweakable block cipher of authenticated encryption (AE) Deoxys family, in which Deoxys-II primary choice for use case ‘Defence depth’ among portfolio CAESAR competition. Improvements related-tweakey rectangle attacks on round-reduced using known distinguishers focussed this study. Under new related-key attack framework proposed by Dong et al. EUROCRYPT 2022, we present...

2007
Hongjun Wu

VEST is an exceptionally efficient cipher family that belongs to the most advanced type of design that offers multi-functionality in one highly efficient module. VEST is readily scaled in hardware. The problem of efficient generation of a secure message digest for scaled ciphers is overcome when VEST is combined with XOR-MAC. XOR-MAC technologies are proven secure but suffer performance restric...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید