Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector

被引:0
作者
Palash Sarkar
机构
[1] Indian Statistical Institute,Applied Statistics Unit
来源
Cryptography and Communications | 2014年 / 6卷
关键词
Stream cipher with IV; Universal hash function; Authentication; Authenticated encryption with associated data; Deterministic authenticated encryption; Modes of operations; 11T71; 68P25; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These include message authentication code (MAC), authenticated encryption (AE), authenticated encryption with associated data (AEAD) and deterministic authenticated encryption (DAE) with associated data. Several schemes are presented and rigourously analysed. A major component of the constructions is a keyed hash function having provably low collision and differential probabilities. Methods are described to efficiently extend such hash functions to take multiple inputs. In particular, double-input hash functions are required for the construction of AEAD schemes. An important practical aspect of our work is that a designer can combine off-the-shelf stream ciphers with off-the-shelf hash functions to obtain secure primitives for MAC, AE, AEAD and DAE(AD).
引用
收藏
页码:189 / 231
页数:42
相关论文
共 26 条
[1]  
Ågren M(2011)Grain-128a: a new version of grain-128 with optional authentication Int. J. Wirel. Mob. Comput. 5 48-59
[2]  
Hell M(1979)Universal classes of hash functions J. Comput. Syst. Sci. 18 143-154
[3]  
Johansson T(2008)A general construction of tweakable block ciphers and different modes of operations IEEE Trans. Inf. Theory 54 1991-2006
[4]  
Meier W(1974)Codes which detect deception Bell Syst. Tech. J. 53 405-424
[5]  
Carter L(1972)Fast evaluation of polynomials by rational preparation Commun. Pur. Appl. Math. 25 433-458
[6]  
Wegman MN(2003)OCB: a block-cipher mode of operation for efficient authenticated encryption ACM Trans. Inf. Syst. Secur. 6 365-403
[7]  
Chakraborty D(2013)A new multi-linear hash family Des. Codes Crypt. 69 351-367
[8]  
Sarkar P(2008)A general mixing strategy for the ECB-Mix-ECB mode of operation Inf. Process. Lett. 109 121-123
[9]  
Gilbert EN(2009)Efficient tweakable enciphering schemes from (block-wise) universal hash functions IEEE Trans. Inf. Theory 55 4749-4759
[10]  
MacWilliams FJ(2010)Pseudo-random functions and parallelizable modes of operations of a block cipher IEEE Trans. Inf. Theory 56 4025-4037