The EAX mode of operation
We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and...
محفوظ في:
المؤلفون الرئيسيون: | , , |
---|---|
التنسيق: | مقال |
اللغة: | English |
منشور في: |
2014
|
الوصول للمادة أونلاين: | http://www.scopus.com/inward/record.url?eid=2-s2.0-35048826242&partnerID=40&md5=a6dd20591be90da119e5e2fdfbe789e1 http://cmuir.cmu.ac.th/handle/6653943832/6307 |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
الملخص: | We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and the mode uses 2[|M|/n] + [|H|/n] + [|N|/n] block-cipher calls when these strings are nonempty and n is the block length of the underlying block cipher. Among EAX's characteristics are that it is on-line (the length of a message isn't needed to begin processing it) and a fixed header can be pre-processed, effectively removing the per-message cost of binding it to the ciphertext. © International Association for Cryptologic Research 2004. |
---|