Sciweavers

Share
CISC
2006
Springer

A General Construction of Tweakable Block Ciphers and Different Modes of Operations

11 years 3 months ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC construction by working over a ring R and by the use of a masking sequence of functions. The ring R can be instantiated as either GF(2n ) or as ZZ2n . Further, over GF(2n ), efficient instantiations of the masking sequence of functions can be done using either a binary Linear Feedback Shift Register (LFSR); a powering construction; a cellular automata map; or by using a word oriented LFSR. Rogaway's TBC construction was built from the powering construction over GF(2n ). Our second contribution is to use the general TBC construction to instantiate constructions of various modes of operations including authenticated encryption (AE) and message authentication code (MAC). In particular, this gives rise to a family of efficient one-pass AE mode of operation. Out of these, the mode of operation obtained by the u...
Debrup Chakraborty, Palash Sarkar
Added 20 Aug 2010
Updated 20 Aug 2010
Type Conference
Year 2006
Where CISC
Authors Debrup Chakraborty, Palash Sarkar
Comments (0)
books