Pipelineable On-line Encryption

被引:23
作者
Abed, Farzaneh [1 ]
Fluhrer, Scott [2 ]
Forler, Christian [1 ]
List, Eik [1 ]
Lucks, Stefan [1 ]
McGrew, David [2 ]
Wenzel, Jakob [1 ]
机构
[1] Bauhaus Univ Weimar, D-99423 Weimar, Germany
[2] Cisco Syst, San Jose, CA USA
来源
FAST SOFTWARE ENCRYPTION, FSE 2014 | 2015年 / 8540卷
关键词
On-line cipher; Chosen-ciphertext security; Authenticated encryption; AUTHENTICATED-ENCRYPTION; PERFORMANCE; CIPHERS;
D O I
10.1007/978-3-662-46706-0_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Correct authenticated decryption requires the receiver to buffer the decrypted message until the authenticity check has been performed. In high-speed networks, which must handle large message frames at low latency, this behavior becomes practically infeasible. This paper proposes CCA-secure on-line ciphers as a practical alternative to AE schemes since the former provide some defense against malicious message modifications. Unfortunately, all published on-line ciphers so far are either inherently sequential, or lack a CCA-security proof. This paper introduces POE, a family of on-line ciphers that combines provable security against chosen-ciphertext attacks with pipelineability to support efficient implementations. POE combines a block cipher and an epsilon-AXU family of hash functions. Different instantiations of POE are given, based on different universal hash functions and suitable for different platforms. Moreover, this paper introduces POET, a provably secure on-line AE scheme, which inherits pipelineability and chosen-ciphertext-security from POE and provides additional resistance against noncemisuse attacks.
引用
收藏
页码:205 / 223
页数:19
相关论文
共 43 条
[1]  
Abdelraheem Mohamed Ahmed, 2014, 2014226 CRYPT EPRINT
[2]  
Abed F., 2014, 2014297 CRYPT EPRINT
[3]  
Andreeva E., 2013, DIRECTIONS AUTHENTIC
[4]  
Andreeva E, 2013, LECT NOTES COMPUT SC, V8269, P424, DOI 10.1007/978-3-642-42033-7_22
[5]  
[Anonymous], 2009, IEEE Std, P1139, DOI DOI 10.1109/IEEESTD.2008.4797525
[6]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3017, P389
[7]   On-line Ciphers and the Hash-CBC Constructions [J].
Bellare, M. ;
Boldyreva, A. ;
Knudsen, L. ;
Namprempre, C. .
JOURNAL OF CRYPTOLOGY, 2012, 25 (04) :640-679
[8]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[9]  
Bellare M., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P292
[10]  
Bertoni Guido, 2011, P SAC, P320, DOI DOI 10.1007/978-3-642-28496-019