2015
DOI: 10.1007/s12095-015-0153-6
|View full text |Cite
|
Sign up to set email alerts
|

On modes of operations of a block cipher for authentication and authenticated encryption

Abstract: Abstract. This work deals with the various requirements of encryption and authentication in cryptographic applications. The approach is to construct suitable modes of operations of a block cipher to achieve the relevant goals. A variety of schemes suitable for specific applications are presented. While none of the schemes are built completely from scratch, there is a common unifying framework which connects them. All the schemes described have been implemented and the implementation details are publicly availa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 51 publications
0
5
0
Order By: Relevance
“…Most of the ECC-based Authentication schemes have acceptable attainment but are undefendable to all security breaches. Chakraborty et al, [21] provided a uniform platform for Advanced Encryption Standards and the Intel AES-NI instructions to achieve authenticated Encryption with associated data. The existing frameworks are not standard or generally accepted frameworks.…”
Section: A Lightweight Cryptographic Algorithmsmentioning
confidence: 99%
“…Most of the ECC-based Authentication schemes have acceptable attainment but are undefendable to all security breaches. Chakraborty et al, [21] provided a uniform platform for Advanced Encryption Standards and the Intel AES-NI instructions to achieve authenticated Encryption with associated data. The existing frameworks are not standard or generally accepted frameworks.…”
Section: A Lightweight Cryptographic Algorithmsmentioning
confidence: 99%
“…PAE and the XLS cipherlengthening scheme turned out to be completely insecure. PAE was later modified [92], whereas XLS was withdrawn.…”
Section: Problematic Proofsmentioning
confidence: 99%
“…While various blockcipher-based fully misuse-resistant AE schemes exist (such as SIV [76] [73]), and DAEAD [20]), the state of the art for permutation-based schemes is rather scarce. In particular, the only misuse-resistant AE schemes known in literature are Haddoc and Mr. Monster Burrito by Bertoni et al [12].…”
Section: Masked Even-mansour (Mem) Tweakable Ciphermentioning
confidence: 99%