A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Two practical and provably secure block ciphers: BEAR and LION
[chapter]
1996
Lecture Notes in Computer Science
In this paper we suggest two new provably secure block ciphers, called BEAR and LION. They both have large block sizes, and are based on the Luby-Rackoff construction. ...
Their underlying components are a hash function and a stream cipher, and they are provably secure in the sense that attacks which find their keys would yield attacks on one or both of the underlying components ...
Acknowledgment: We would like to thank Mike Roe for making his code available to us for testing, and to the referees for valuable comments. ...
doi:10.1007/3-540-60865-6_48
fatcat:teorwwst7bfh5or6yoiiazkhki
On the provable security of BEAR and LION schemes
[article]
2011
arXiv
pre-print
BEAR, LION and LIONESS are block ciphers presented by Biham and Anderson (1996), inspired by the famous Luby-Rackoff constructions of block ciphers from other cryptographic primitives (1988). ...
The ciphers proposed by Biham and Anderson are based on one stream cipher and one hash function. Good properties of the primitives ensure good properties of the block cipher. ...
This work has been supported by TELSY Elettronica e Telecomunicazioni, an Italian company working in Information and Communication Security. ...
arXiv:1105.0259v1
fatcat:bucg655ydvdnnjuofei3sp6r4m
BEAST: A fast block cipher for arbitrary blocksizes
[chapter]
1996
IFIP Advances in Information and Communication Technology
BEAST is assembled from cryptographic hash functions and stream ciphers. It is provably secure if these building blocks are secure. ...
Keywords Block-cipher, Luby-Rackoff, pseudorandom permutation, provably secure, smartcard, remote key P. ...
Anderson and Biham proposed two block ciphers for flexible but large blocks: BEAR and LION, both similar to Figure 2 with (1 + r)-bit Blocks. ...
doi:10.1007/978-0-387-35083-7_13
fatcat:ph6v7juqjbaa3kwoxeag2t7tda
Building Provably Secure Block Ciphers from Cryptographic Hash Functions
2020
International Journal of Computer Applications
This paper presents a proposal for the construction of provably secure block ciphers based on cryptographic hash functions. ...
secure. ...
These constructions typically use both hash functions and stream ciphers as sources of pseudorandomness. BEAR and LION [7] are examples of provably secure block ciphers based on this result. ...
doi:10.5120/ijca2020920123
fatcat:4gjvj6mnqba3peyswisirtvwgy
Building Secure Block Ciphers on Generic Attacks Assumptions
[chapter]
2009
Lecture Notes in Computer Science
Up to now, the design of block ciphers has been mainly driven by heuristic arguments, and little theory is known to constitute a good guideline for the development of their architecture. ...
By opposition, other provably secure symmetric primitives, as for example C [3] and KFC [4], designed using information-theoretic results, are only proved to resist a limited (though significant) range ...
There have been a number of "provably secure" block ciphers proposals. We review the most prominent of them. BEAR and LION were proposed by Anderson and Biham [2] . ...
doi:10.1007/978-3-642-04159-4_5
fatcat:lbxt5nkisza3paoaizw3wpuozu
Ciphers with Arbitrary Finite Domains
[chapter]
2002
Lecture Notes in Computer Science
We want to achieve this goal starting from a block cipher (which requires a message space of size N = 2 n , for some n). ...
We see ciphers with arbitrary domains as a worthwhile primitive in its own right, and as a potentially useful one for making higher-level protocols. ...
Thanks also to Mihir Bellare, David McGrew, and Silvio Micali for their helpful comments. ...
doi:10.1007/3-540-45760-7_9
fatcat:zmhomwbaorhvboa5kxa7nxetiy
On the Construction of Variable-Input-Length Ciphers
[chapter]
1999
Lecture Notes in Computer Science
This paper introduces the problem of constructing such objects, and provides a practical solution. Our VIL mode of operation make s a v ariable-input-length cipher from any block cipher. ...
Whereas a block cipher enciphers messages of some one particular length the blocklength, a variable-input-length cipher takes messages of varying and preferably arbitrary lengths. ...
Phillip Rogaway was supported by NSF CAREER Award CCR-962540, and MICRO grants 97-150 and 98-129, funded by RSA Data Security, Inc., and ORINCON Corporation. ...
doi:10.1007/3-540-48519-8_17
fatcat:vie4wr3y7re7hpmeueambarmnm
On the security of remotely keyed encryption
[chapter]
1997
Lecture Notes in Computer Science
Also GRIFFIN is proposed, a fast new block cipher for flexible but large blocks. The RaMaRK scheme and GRIFFIN are provably secure if the underlying building blocks are secure. ...
Since the attacker can take over the slow device and actually take part in the encryption process, common definitions of the security of block ciphers have to be reconsidered. ...
and if the blocks are large, GRIFFIN can be expected to run at about the same speed as LION and thus significantly faster than its competitor LIONESS. 4 ...
doi:10.1007/bfb0052349
fatcat:xprfw4ngcjazbghwsqzk2oy4ri
Fast encryption for set-top technologies
1998
Multimedia Computing and Networking 1999
The rst is to evaluate modern block ciphers in a JAVA environment. The second approach is based on recent developments regarding fast Luby Racko ciphers. ...
In contrast to ciphers such as BEAR, LION, LIONESS, BEAST, and GRIFFIN, conventional block ciphers such as DES, IDEA and Blow sh work on xed but small blocks typically 64 bit. ...
Like BEAR, LION, LIONESS 3 and BEAST, 28 GRIFFIN is based on the famous Luby-Racko construction. 26 Actually, BEAR, LION, and BEAST are three-round Luby-Racko ciphers, LIONESS is a four-round Luby-Racko ...
doi:10.1117/12.333826
fatcat:s7zlgvrrtvhanakpyy753od2we
Recent Developments in the Design of Conventional Cryptographic Algorithms
[chapter]
1998
Lecture Notes in Computer Science
This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and hash functions. ...
It provides an overview of the design principles of a large number of recent proposals, which includes the global structure, the number of rounds, the way of introducing non-linearity and diffusion, and ...
Two examples of this construction are LION and BEAR [6] , both based on a combination of an additive stream cipher and a hash function (SEAL and SHA-1 are used as examples). ...
doi:10.1007/3-540-49248-8_4
fatcat:ifsnr5zxk5fo3gwbex32pgpnhm
Scramble All, Encrypt Small
[chapter]
1999
Lecture Notes in Computer Science
In this paper, we propose a new design tool for "block encryption", allowing the en/decryption of arbitrarily long messages, but performing en/decryption on only a single block (e.g., 128 bit block), where ...
the existence of a secure remotely keyed encryption scheme which performs only one interaction with the smart-card device. ...
From an engineering perspective, the Bear and Lion designs [AB96] have taught how to encrypt an arbitrary long block given fast stream ciphers. ...
doi:10.1007/3-540-48519-8_8
fatcat:fkakuwrnqbhqbpwwfhdjtkiy5q
Simpira v2: A Family of Efficient Permutations Using the AES Round Function
[chapter]
2016
Lecture Notes in Computer Science
.: Two Practical and Provably Secure Block Ciphers:
BEARS and LION. In: FSE 1996. LNCS, vol. 1039, pp. 113–120. Springer (1996)
3. ...
Some of the earliest designs are Bear and Lion [2], and Beast [61]. They are
higher-level constructions, in the sense that they use hash functions and stream
ciphers as underlying components. ...
doi:10.1007/978-3-662-53887-6_4
fatcat:3wjksrkgqzgo3pg57fpdq6cffu
The Related-Key Analysis of Feistel Constructions
[chapter]
2015
Lecture Notes in Computer Science
It is well known that the classical three-and four-round Feistel constructions are provably secure under chosen-plaintext and chosen-ciphertext attacks, respectively. ...
In this paper we show that, under suitable reuse of round keys, security under related-key attacks can be provably attained. ...
by national funds, through the Foundation for Science and Technology (FCT). ...
doi:10.1007/978-3-662-46706-0_14
fatcat:gg7huflgxvebdns7mcphyuma5u
A Parallelizable Enciphering Mode
[chapter]
2004
Lecture Notes in Computer Science
For a description of EME look ahead to Figures 1 and 2 . We prove that EME is secure, assuming that the underling block cipher is secure. ...
The proof is in the standard, provable-security tradition: an attack on EME (as a ± prp with domain M = {0, 1} n ∪ {0, 1} 2n ∪ · · · ∪ {0, 1} n 2 ) is shown to imply an attack on the underlying block cipher ...
Matsumoto, and H. Imai. On the construction of block ciphers provably secure and not relying on any unproved hypotheses. ...
doi:10.1007/978-3-540-24660-2_23
fatcat:6dkqqvnmlfh2dmmjsfpdkew3au
Practical, scalable alternative session encryption using one-time pads
[article]
2012
arXiv
pre-print
So far as assurance of confidentiality is concerned, today's block ciphers and public key cryptosystems flunk the exam. ...
In this paper, I discredit many myths concerning one-time pads, discuss practical steps to address perceived shortcomings, and shatter the notion that secure generation, distribution, and use of mammoth ...
out to build a onetime pad implementation I would want to use; that is, it needed to be convenient, provably secure under certain assumptions, probably secure when used in practice, scalable to thousands ...
arXiv:1212.5086v1
fatcat:fsibkstwyjdr7g2yl5wiwciekq
« Previous
Showing results 1 — 15 out of 32 results