2015
DOI: 10.1007/978-3-662-46706-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Pipelineable On-line Encryption

Abstract: Abstract. Correct authenticated decryption requires the receiver to buffer the decrypted message until the authenticity check has been performed. In high-speed networks, which must handle large message frames at low latency, this behavior becomes practically infeasible. This paper proposes CCA-secure on-line ciphers as a practical alternative to AE schemes since the former provide some defense against malicious message modifications. Unfortunately, all published on-line ciphers so far are either inherently seq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(29 citation statements)
references
References 32 publications
0
29
0
Order By: Relevance
“…This step usually costs Adv srkprp Φ,E (D), where D is some strong related-key PRP distinguisher with a certain amount of resources, usually q queries to the keyed oracle E φ(k) and τ time, and Φ is the set of related-key deriving functions φ that D is allowed to choose. This reduction is in fact also broadly used beyond the area of tweakable blockciphers, such as in authenticated encryption schemes [1,3,11,21,28,33,37,44,50,51] and message authentication codes [4,13,16,24,29,30,41,47,[57][58][59], and in fact, we are not aware of any security result of a construction based on a standard-model blockcipher that uses a structurally different approach. Inspired by this, we investigate what level of tweakable blockcipher security can be achieved if this proof technique is employed.…”
Section: Optimal Security In Standard Model?mentioning
confidence: 99%
“…This step usually costs Adv srkprp Φ,E (D), where D is some strong related-key PRP distinguisher with a certain amount of resources, usually q queries to the keyed oracle E φ(k) and τ time, and Φ is the set of related-key deriving functions φ that D is allowed to choose. This reduction is in fact also broadly used beyond the area of tweakable blockciphers, such as in authenticated encryption schemes [1,3,11,21,28,33,37,44,50,51] and message authentication codes [4,13,16,24,29,30,41,47,[57][58][59], and in fact, we are not aware of any security result of a construction based on a standard-model blockcipher that uses a structurally different approach. Inspired by this, we investigate what level of tweakable blockcipher security can be achieved if this proof technique is employed.…”
Section: Optimal Security In Standard Model?mentioning
confidence: 99%
“…The problem was large enough that it wasn't clear to us what was intended. Follow-on work mostly replicated this [2,27]. After discussions among ourselves and checking with one of the FFL authors [41], we concluded that the intended definition is the one we have given.…”
Section: Oae1 Definitionmentioning
confidence: 76%
“…In the Ideal2 game the strings 2 and 2 are independent random strings. However, in game Real2 we always have 2 …”
Section: Achieving Oae2mentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, TABLE 1 Comparison study of existing schemes and proposed scheme 14,15,[36][37][38][39][40]45 Scheme Name Parallel Serial OH VME PF Priv. As far our understanding, we use blockcipher-based compression function as a primitive in the component function of the proposed scheme's encryption for the first time.…”
Section: Contributionmentioning
confidence: 99%