Authenticated encryption mode for beyond the birthday bound security

被引:0
作者
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Dept Comp Sci & Engn, Chikusa Ku, Furo, Nagoya 4648603, Japan
来源
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008 | 2008年 / 5023卷
关键词
blockcipher; modes of operation; authenticated encryption; security proofs; birthday bound;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose an authenticated encryption mode for blockciphers. Our authenticated encryption mode, CIP, has provable security bounds which are better than the usual birthday bound security. Besides, the proven security bound for authenticity of CIP is better than any of the previously known schemes. The design is based on the encrypt-then-PRF approach, where the encryption part uses a key stream generation of CENC, and the PRF part combines a hash function based on the inner product and a blockcipher.
引用
收藏
页码:125 / +
页数:4
相关论文
共 28 条
  • [1] [Anonymous], LNCS
  • [2] Bellare M, 1995, LECT NOTES COMPUT SC, V963, P15
  • [3] Bellare M, 2004, LECT NOTES COMPUT SC, V3017, P389
  • [4] A concrete security treatment of symmetric encryption
    Bellare, M
    Desai, A
    Jokipii, E
    Rogaway, P
    [J]. 38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 394 - 403
  • [5] Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
  • [6] Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P317
  • [7] Black J, 2002, LECT NOTES COMPUT SC, V2332, P384
  • [8] Gligor VD, 2002, LECT NOTES COMPUT SC, V2355, P92
  • [9] Iwata T, 2003, LECT NOTES COMPUT SC, V2887, P129
  • [10] Iwata T, 2006, LECT NOTES COMPUT SC, V4047, P310