scispace - formally typeset
Search or ask a question
Topic

Format-preserving encryption

About: Format-preserving encryption is a research topic. Over the lifetime, 112 publications have been published within this topic receiving 2050 citations.


Papers
More filters
Patent
30 Oct 2009
TL;DR: In this article, a plaintext string may be converted to ciphertext by repeated application of a format-preserving encryption cryptographic algorithm, and the resulting version of the string was analyzed to determine whether desired string constraints have been satisfied.
Abstract: Format preserving encryption (FPE) cryptographic engines are provided for performing encryption and decryption on strings. A plaintext string may be converted to ciphertext by repeated application of a format preserving encryption cryptographic algorithm. Following each application of the format preserving cryptographic algorithm, the resulting version of the string may be analyzed to determine whether desired string constraints have been satisfied. If the string constraints have not been satisfied, further applications of the format preserving cryptographic algorithm may be performed. If the string constraints have been satisfied, the current version of the string may be used as an output for the cryptographic engine.

34 citations

01 Jan 2010
TL;DR: In this survey, FPE is described and known techniques for achieving it are reviewed, including FFX, a recent proposal made to NIST.
Abstract: Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of the same format—for example, encrypting a social-security number into a social-security number. In this survey we describe FPE and review known techniques for achieving it. These include FFX, a recent proposal made to NIST.

28 citations

Proceedings ArticleDOI
24 Oct 2016
TL;DR: In this article, the authors give attacks on format-preserving encryption (FPE) schemes that succeed in message recovery (not merely distinguishing scheme outputs from random) when the message space is small.
Abstract: We give attacks on Feistel-based format-preserving encryption (FPE) schemes that succeed in message recovery (not merely distinguishing scheme outputs from random) when the message space is small. For $4$-bit messages, the attacks fully recover the target message using $2^{21}$ examples for the FF3 NIST standard and $2^{25}$ examples for the FF1 NIST standard. The examples include only three messages per tweak, which is what makes the attacks non-trivial even though the total number of examples exceeds the size of the domain. The attacks are rigorously analyzed in a new definitional framework of message-recovery security. The attacks are easily put out of reach by increasing the number of Feistel rounds in the standards.

25 citations

Patent
08 Jun 2018
TL;DR: In this paper, a secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector.
Abstract: Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector. The transposition vector is then inherited by the encryption process, which shifts characters and encrypts those characters using a variety of encryption processes, all completely reversible. In one embodiment, one or more auxiliary keys, transmitted as clear text header values, are used as initial values to vary the transposition vectors generated from the secret key, e.g., from encryption-to-encryption. Any number of rounds of encryption can be applied, each having associated headers used to “detokenize” encryption data and perform rounds to decryption to recover the original data (or parent token information). Format preserving encryption (FPE) techniques are also provided with application to, e.g., payment processing.

24 citations

Book ChapterDOI
17 Mar 2014
TL;DR: An evaluation of the three new algorithms recommended by NIST for format-preserving encryption with respect to entropy and operational latency when implemented on a Xilinx Virtex-6 (XC6VLX240T) FPGA.
Abstract: Legacy critical infrastructure systems lack secure communications capabilities that can protect against modern threats. In particular, operational requirements such as message format and interoperability prevent the adoption of standard encryption algorithms. Three new algorithms recommended by the National Institute of Standards and Technology (NIST) for format-preserving encryption could potentially support the encryption of legacy protocols in critical infrastructure assets. The three algorithms, FF1, FF2 and FF3, provide the ability to encrypt arbitrarily-formatted data without padding or truncation, which is a critical requirement for interoperability in legacy systems. This paper presents an evaluation of the three algorithms with respect to entropy and operational latency when implemented on a Xilinx Virtex-6 (XC6VLX240T) FPGA. While the three algorithms inherit the security characteristics of the underlying Advanced Encryption Standard (AES) cipher, they exhibit some important differences in their performance characteristics.

23 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Cryptography
37.3K papers, 854.5K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
83% related
Hash function
31.5K papers, 538.5K citations
83% related
Password
35K papers, 389.6K citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20217
202013
201917
201813
201710
201613