The EAX mode of operation
We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and...
Saved in:
Main Authors: | , , |
---|---|
格式: | Article |
語言: | English |
出版: |
2014
|
在線閱讀: | http://www.scopus.com/inward/record.url?eid=2-s2.0-35048826242&partnerID=40&md5=a6dd20591be90da119e5e2fdfbe789e1 http://cmuir.cmu.ac.th/handle/6653943832/6307 |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
機構: | Chiang Mai University |
語言: | English |
總結: | We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and the mode uses 2[|M|/n] + [|H|/n] + [|N|/n] block-cipher calls when these strings are nonempty and n is the block length of the underlying block cipher. Among EAX's characteristics are that it is on-line (the length of a message isn't needed to begin processing it) and a fixed header can be pre-processed, effectively removing the per-message cost of binding it to the ciphertext. © International Association for Cryptologic Research 2004. |
---|