Book ChapterDOI
Integrity-Aware PCBC Encryption Schemes
Virgil D. Gligor,Pompiliu Donescu +1 more
- pp 153-171
TLDR
In this paper, the authors define secure plaintext-ciphertext block chaining (PCBC) schemes that detect integrity violations caused by adaptive chosen-message (i.e., chosen-plaintext and ciphertext) attacks when used with typical non-cryptographic Manipulation Detection Code (MDC) functions, such as bitwise exclusive or, modular addition, CRC-32, and quadratic checksums.Abstract:
Traditional encryption schemes, such as Cipher Block Chaining (CBC), are unable to detect integrity violations caused by adaptive chosen-message (i.e., chosen-plaintext and ciphertext) attacks when used with typical non-cryptographic Manipulation Detection Code (MDC) functions, such as bitwise exclusive-or, modular addition, CRC-32, and quadratic checksums. In this paper, we define secure Plaintext-Ciphertext Block Chaining (PCBC) schemes that detect such violations at a low performance cost, thereby preserving both message secrecy and integrity against chosen-message attacks. We present the salient properties of these schemes, their security, and preliminary performance measurements.read more
Citations
More filters
Proceedings ArticleDOI
OCB: a block-cipher mode of operation for efficient authenticated encryption
TL;DR: It is proved OCB secure, quantifying the adversary's ability to violate the mode's privacy or authenticity in terms of the quality of its block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively.
Journal ArticleDOI
OCB: A block-cipher mode of operation for efficient authenticated encryption
TL;DR: It is proved OCB secure, quantifying the adversary's ability to violate the mode's privacy or authenticity in terms of the quality of its block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively.
Book ChapterDOI
The EAX Mode of Operation
TL;DR: A block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD), which is on-line and a fixed header can be pre-processed, effectively removing the per-message cost of binding it to the ciphertext.
Book ChapterDOI
Encryption Modes with Almost Free Message Integrity
TL;DR: A new mode of operation for block encryption which in addition to assuring confidentiality also assures message integrity is defined, called Integrity Aware CBC (IACBC), which requires a total of m + 2 block encryptions on a plaintext of length m blocks.
Book
Electronic Payment Systems
TL;DR: Electronic Payment Systems offers the first comprehensive, up-to-date survey of the major payment schemes currently available from a technical user perspective.
References
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
The Kerberos Network Authentication Service (V5)
J. Kohl,Clifford Neuman +1 more
TL;DR: This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system, presently in production use at MIT's Project Athena, and at other Internet sites.
Proceedings ArticleDOI
A concrete security treatment of symmetric encryption
TL;DR: This work studies notions and schemes for symmetric (ie. private key) encryption in a concrete security framework and gives four different notions of security against chosen plaintext attack, providing both upper and lower bounds, and obtaining tight relations.