Filters








42 Hits in 4.6 sec

CWC: A High-Performance Conventional Authenticated Encryption Mode [chapter]

Tadayoshi Kohno, John Viega, Doug Whiting
2004 Lecture Notes in Computer Science  
CWC is the first such mode having all five of the following properties: provable security, parallelizability, high performance in hardware, high performance in software, and no intellectual property concerns  ...  We introduce CWC, a new block cipher mode of operation for protecting both the privacy and the authenticity of encapsulated data.  ...  Kohno was supported by a National Defense Science and Engineering Fellowship.  ... 
doi:10.1007/978-3-540-25937-4_26 fatcat:jgywegft2reepgumhcq25m4d4a

The Security and Performance of the Galois/Counter Mode (GCM) of Operation [chapter]

David A. McGrew, John Viega
2004 Lecture Notes in Computer Science  
We analyze its security and performance, and show that it is the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data  ...  The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binary finite  ...  CWC is similar but requires an additional AES encryption to process the authentication tag.  ... 
doi:10.1007/978-3-540-30556-9_27 fatcat:2eou5v27kjfbnpe2ykfw7zjnae

A lightweight cryptographic system for implantable biosensors

Sara S. Ghoreishizadeh, Tolga Yalcin, Antonio Pullini, Giovanni De Micheli, Wayne Burleson, Sandro Carrara
2014 2014 IEEE Biomedical Circuits and Systems Conference (BioCAS) Proceedings  
This design uses the recently standardized SHA-3 Keccak secure hash function implemented in an authenticated encryption mode.  ...  The security core occupies only 1550 gateequivalents, which is the smallest authenticated encryption core reported to date.  ...  The research has been funded in part by the project IronIC++ that is financed with a grant from the Swiss Nano-Tera.ch initiative and evaluated by the Swiss National Science Foundation.  ... 
doi:10.1109/biocas.2014.6981765 dblp:conf/biocas/GhoreishizadehY14 fatcat:mn2w4zx7dvb2jc2ufjthl27xia

On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices [chapter]

Tolga Yalçın, Elif Bilge Kavun
2013 Lecture Notes in Computer Science  
Especially for authenticated encryption, such performance can not be achieved with a standard encryption-hash algorithm pair or even a "block cipher mode of operation" approach.  ...  These devices are not only extremely resourceconstrained, but most of them also require high performance -with respect to available resources -in terms of security, speed and latency.  ...  Therefore, authenticated encryption is introduced as a block cipher mode of operation, where the same cipher block performs both functionalities.  ... 
doi:10.1007/978-3-642-37288-9_10 fatcat:brm5dzavmzgepgqnd4o3yfu6oi

Parallel Authenticated Encryption for Misuse Resistance using EME with Linear Mixing

Smriti Pathak
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Wherever a masked plaintext is encrypted in ECB mode of, then a non-linear mixing is performed so once again associate encryption is performed in ECB mode that is covert to provide the cipher text. exploitation  ...  the property of the binary field we are additionally show that the construction with linear mixing does not offer SPRP security though we have a tendency to perform all the operations during a prime field  ...  Examples of Authenticated Encryptions So far, cryptography community put a lot of effort of designing different authenticated encryptions.  ... 
doi:10.23956/ijarcsse/v7i7/0212 fatcat:4wtum6ynpzapji3wzj4oi36r7a

FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks [article]

Devesh Jinwala, Dhiren Patel, Kankar Dasgupta
2012 arXiv   pre-print
Therefore, we believe that there is a need for investigating the feasibility of a configurable software-based link layer security architecture wherein an application can be compiled flexibly, with respect  ...  We also experimentally evaluate various aspects related to our scheme viz. configurable block ciphers, configurable block cipher modes of operations, configurable MAC sizes and configurable replay protection  ...  GCM uses a conventional mode for encryption but uses the authentication by computing the MAC in the Galois field.  ... 
arXiv:1203.4697v1 fatcat:mphgtvimrrgyvfbwveumnc6yh4

Efficient Authentication for Mobile and Pervasive Computing [chapter]

Basel Alomair, Radha Poovendran
2010 Lecture Notes in Computer Science  
The key idea behind the proposed technique is to append a short random string to the plaintext message before encryption to facilitate a more efficient authentication.  ...  In this work, we propose a novel technique for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications.  ...  [55] proposed CWC, a high-performance conventional authenticated encryption mode.  ... 
doi:10.1007/978-3-642-17650-0_14 fatcat:pegpzpqftbgdhgyewjjusrs5eu

Efficient Authentication for Mobile and Pervasive Computing

Basel Alomair, Radha Poovendran
2014 IEEE Transactions on Mobile Computing  
The key idea behind the proposed technique is to append a short random string to the plaintext message before encryption to facilitate a more efficient authentication.  ...  In this work, we propose a novel technique for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications.  ...  [55] proposed CWC, a high-performance conventional authenticated encryption mode.  ... 
doi:10.1109/tmc.2012.252 fatcat:t4ndzld7ifa5rflukxqrztlosi

The Software Performance of Authenticated-Encryption Modes [chapter]

Ted Krovetz, Phillip Rogaway
2011 Lecture Notes in Computer Science  
We study the software performance of authenticated-encryption modes CCM, GCM, and OCB. Across a variety of platforms, we find OCB to be substantially faster than either alternative.  ...  For example, on an Intel i5 ("Clarkdale") processor, good implementations of CCM, GCM, and OCB encrypt at around 4.2 cpb, 3.7 cpb, and 1.5 cpb, while CTR mode requires about 1.3 cpb.  ...  McGrew and Viega identified two performance issues in the design of OCB1. First, the mode uses m + 2 blockcipher calls to encrypt a message of m = ⌈|M |/128⌉ blocks.  ... 
doi:10.1007/978-3-642-21702-9_18 fatcat:rxh5ghghgjhx3hlzxk4bojbhty

Authenticated Encryption Schemes: A Systematic Review

Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
2022 IEEE Access  
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity.  ...  A considerable amount of research has been devoted to the area since its formal inception in 2000.  ...  There are three conventional approaches to constructing an AE scheme, also called generic composition [6] : the encryptthen-authenticate (EtA), encrypt-and-authenticate (E&A), and authenticate-then-encrypt  ... 
doi:10.1109/access.2022.3147201 fatcat:cybzrqntvrafnf5craphdsh7ve

Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack [article]

Ambili K. N, Jimmy Jose
2022 IACR Cryptology ePrint Archive  
ASCON is a sponge function based authenticated encryption (AE) scheme suitable for high performance applications.  ...  ASCON is a finalist and GIMLI is a round 2 candidate of NIST lightweight cryptography competition.  ...  Counter with CBC-MAC (CCM) [18] , Encrypt-then-Authenticate-then-Translate (EAX) [2] and Carter-Wegman-Counter (CWC) [9] modes belong to this category.  ... 
dblp:journals/iacr/NJ22b fatcat:r54zatc6yfdnnd277dwk6wxg4y

ELmE: A Misuse Resistant Parallel Authenticated Encryption [chapter]

Nilanjan Datta, Mridul Nandi
2014 Lecture Notes in Computer Science  
In this paper, we design a new online secure authenticated encryption, called ELmE or Encrypt-Linear mix-Encrypt, which is completely (twostage) parallel (even in associated data) and pipeline implementable  ...  ) and online constructions, e.g., McOE, sponge-type authenticated encryptions (such as duplex, AEGIS) and COPA.  ...  study on the performance of block-cipher based Authenticated Encryptions.  ... 
doi:10.1007/978-3-319-08344-5_20 fatcat:pcjdlebe3zd2vh46vcvsdjduam

Pipelineable On-line Encryption [chapter]

Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew, Jakob Wenzel
2015 Lecture Notes in Computer Science  
Correct authenticated decryption requires the receiver to buffer the decrypted message until the authenticity check has been performed.  ...  In high-speed networks, which must handle large message frames at low latency, this behavior becomes practically infeasible.  ...  Finally, we thank Jian Guo, Jérémy Jean, Thomas Peyrin, and Lei Wang who pointed out a mismatch between the specified and the analyzed version of POET in the pre-proceedings version [20] .  ... 
doi:10.1007/978-3-662-46706-0_11 fatcat:gr4yc2uzsvfhff24i233hegbzy

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The Carter-Wegman Counter (CWC) mode specified in [41] uses a variant of CTR mode for encryption.  ...  In the authenticated encryption mode the payload is encrypted before the MAC is computed on the packet.  ...  They must support the three basic types of cryptography: Bulk Encryption, Message Authentication and Data Integrity.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms [chapter]

Tetsu Iwata, Kaoru Kurosawa
2005 Lecture Notes in Computer Science  
attacks; here f 8 is a generalized version of f 8.  ...  that we insist on the minimal modifications; f 8 + is obtained from f 8 by setting the key modifier to all-zero, and f 9 + is obtained from f 9 by setting the key modifier to all-zero, and using the encryptions  ...  26] , CCM mode [27, 19] , EAX mode [6] , CWC mode [23] and GCM mode [24] for authenticated encryption schemes.  ... 
doi:10.1007/11502760_18 fatcat:3v4gz4p7trfc3czhykn6c4rtaa
« Previous Showing results 1 — 15 out of 42 results