A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
CWC: A High-Performance Conventional Authenticated Encryption Mode
[chapter]
2004
Lecture Notes in Computer Science
CWC is the first such mode having all five of the following properties: provable security, parallelizability, high performance in hardware, high performance in software, and no intellectual property concerns ...
We introduce CWC, a new block cipher mode of operation for protecting both the privacy and the authenticity of encapsulated data. ...
Kohno was supported by a National Defense Science and Engineering Fellowship. ...
doi:10.1007/978-3-540-25937-4_26
fatcat:jgywegft2reepgumhcq25m4d4a
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
[chapter]
2004
Lecture Notes in Computer Science
We analyze its security and performance, and show that it is the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data ...
The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binary finite ...
CWC is similar but requires an additional AES encryption to process the authentication tag. ...
doi:10.1007/978-3-540-30556-9_27
fatcat:2eou5v27kjfbnpe2ykfw7zjnae
A lightweight cryptographic system for implantable biosensors
2014
2014 IEEE Biomedical Circuits and Systems Conference (BioCAS) Proceedings
This design uses the recently standardized SHA-3 Keccak secure hash function implemented in an authenticated encryption mode. ...
The security core occupies only 1550 gateequivalents, which is the smallest authenticated encryption core reported to date. ...
The research has been funded in part by the project IronIC++ that is financed with a grant from the Swiss Nano-Tera.ch initiative and evaluated by the Swiss National Science Foundation. ...
doi:10.1109/biocas.2014.6981765
dblp:conf/biocas/GhoreishizadehY14
fatcat:mn2w4zx7dvb2jc2ufjthl27xia
On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices
[chapter]
2013
Lecture Notes in Computer Science
Especially for authenticated encryption, such performance can not be achieved with a standard encryption-hash algorithm pair or even a "block cipher mode of operation" approach. ...
These devices are not only extremely resourceconstrained, but most of them also require high performance -with respect to available resources -in terms of security, speed and latency. ...
Therefore, authenticated encryption is introduced as a block cipher mode of operation, where the same cipher block performs both functionalities. ...
doi:10.1007/978-3-642-37288-9_10
fatcat:brm5dzavmzgepgqnd4o3yfu6oi
Parallel Authenticated Encryption for Misuse Resistance using EME with Linear Mixing
2017
International Journal of Advanced Research in Computer Science and Software Engineering
Wherever a masked plaintext is encrypted in ECB mode of, then a non-linear mixing is performed so once again associate encryption is performed in ECB mode that is covert to provide the cipher text. exploitation ...
the property of the binary field we are additionally show that the construction with linear mixing does not offer SPRP security though we have a tendency to perform all the operations during a prime field ...
Examples of Authenticated Encryptions So far, cryptography community put a lot of effort of designing different authenticated encryptions. ...
doi:10.23956/ijarcsse/v7i7/0212
fatcat:4wtum6ynpzapji3wzj4oi36r7a
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks
[article]
2012
arXiv
pre-print
Therefore, we believe that there is a need for investigating the feasibility of a configurable software-based link layer security architecture wherein an application can be compiled flexibly, with respect ...
We also experimentally evaluate various aspects related to our scheme viz. configurable block ciphers, configurable block cipher modes of operations, configurable MAC sizes and configurable replay protection ...
GCM uses a conventional mode for encryption but uses the authentication by computing the MAC in the Galois field. ...
arXiv:1203.4697v1
fatcat:mphgtvimrrgyvfbwveumnc6yh4
Efficient Authentication for Mobile and Pervasive Computing
[chapter]
2010
Lecture Notes in Computer Science
The key idea behind the proposed technique is to append a short random string to the plaintext message before encryption to facilitate a more efficient authentication. ...
In this work, we propose a novel technique for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. ...
[55] proposed CWC, a high-performance conventional authenticated encryption mode. ...
doi:10.1007/978-3-642-17650-0_14
fatcat:pegpzpqftbgdhgyewjjusrs5eu
Efficient Authentication for Mobile and Pervasive Computing
2014
IEEE Transactions on Mobile Computing
The key idea behind the proposed technique is to append a short random string to the plaintext message before encryption to facilitate a more efficient authentication. ...
In this work, we propose a novel technique for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. ...
[55] proposed CWC, a high-performance conventional authenticated encryption mode. ...
doi:10.1109/tmc.2012.252
fatcat:t4ndzld7ifa5rflukxqrztlosi
The Software Performance of Authenticated-Encryption Modes
[chapter]
2011
Lecture Notes in Computer Science
We study the software performance of authenticated-encryption modes CCM, GCM, and OCB. Across a variety of platforms, we find OCB to be substantially faster than either alternative. ...
For example, on an Intel i5 ("Clarkdale") processor, good implementations of CCM, GCM, and OCB encrypt at around 4.2 cpb, 3.7 cpb, and 1.5 cpb, while CTR mode requires about 1.3 cpb. ...
McGrew and Viega identified two performance issues in the design of OCB1. First, the mode uses m + 2 blockcipher calls to encrypt a message of m = ⌈|M |/128⌉ blocks. ...
doi:10.1007/978-3-642-21702-9_18
fatcat:rxh5ghghgjhx3hlzxk4bojbhty
Authenticated Encryption Schemes: A Systematic Review
2022
IEEE Access
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. ...
A considerable amount of research has been devoted to the area since its formal inception in 2000. ...
There are three conventional approaches to constructing an AE scheme, also called generic composition [6] : the encryptthen-authenticate (EtA), encrypt-and-authenticate (E&A), and authenticate-then-encrypt ...
doi:10.1109/access.2022.3147201
fatcat:cybzrqntvrafnf5craphdsh7ve
Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack
[article]
2022
IACR Cryptology ePrint Archive
ASCON is a sponge function based authenticated encryption (AE) scheme suitable for high performance applications. ...
ASCON is a finalist and GIMLI is a round 2 candidate of NIST lightweight cryptography competition. ...
Counter with CBC-MAC (CCM) [18] , Encrypt-then-Authenticate-then-Translate (EAX) [2] and Carter-Wegman-Counter (CWC) [9] modes belong to this category. ...
dblp:journals/iacr/NJ22b
fatcat:r54zatc6yfdnnd277dwk6wxg4y
ELmE: A Misuse Resistant Parallel Authenticated Encryption
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we design a new online secure authenticated encryption, called ELmE or Encrypt-Linear mix-Encrypt, which is completely (twostage) parallel (even in associated data) and pipeline implementable ...
) and online constructions, e.g., McOE, sponge-type authenticated encryptions (such as duplex, AEGIS) and COPA. ...
study on the performance of block-cipher based Authenticated Encryptions. ...
doi:10.1007/978-3-319-08344-5_20
fatcat:pcjdlebe3zd2vh46vcvsdjduam
Pipelineable On-line Encryption
[chapter]
2015
Lecture Notes in Computer Science
Correct authenticated decryption requires the receiver to buffer the decrypted message until the authenticity check has been performed. ...
In high-speed networks, which must handle large message frames at low latency, this behavior becomes practically infeasible. ...
Finally, we thank Jian Guo, Jérémy Jean, Thomas Peyrin, and Lei Wang who pointed out a mismatch between the specified and the analyzed version of POET in the pre-proceedings version [20] . ...
doi:10.1007/978-3-662-46706-0_11
fatcat:gr4yc2uzsvfhff24i233hegbzy
Wireless Sensor Network Security
2013
International Journal of Distributed Sensor Networks
The Carter-Wegman Counter (CWC) mode specified in [41] uses a variant of CTR mode for encryption. ...
In the authenticated encryption mode the payload is encrypted before the MAC is computed on the packet. ...
They must support the three basic types of cryptography: Bulk Encryption, Message Authentication and Data Integrity. ...
doi:10.1155/2013/362385
fatcat:2ph46uukonbtbdkc5q6t4mvgcq
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms
[chapter]
2005
Lecture Notes in Computer Science
attacks; here f 8 is a generalized version of f 8. ...
that we insist on the minimal modifications; f 8 + is obtained from f 8 by setting the key modifier to all-zero, and f 9 + is obtained from f 9 by setting the key modifier to all-zero, and using the encryptions ...
26] , CCM mode [27, 19] , EAX mode [6] , CWC mode [23] and GCM mode [24] for authenticated encryption schemes. ...
doi:10.1007/11502760_18
fatcat:3v4gz4p7trfc3czhykn6c4rtaa
« Previous
Showing results 1 — 15 out of 42 results