The EAX mode of operation

We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and...

Full description

Saved in:
Bibliographic Details
Main Authors: Bellare M., Rogaway P., Wagner D.
Format: Article
Language:English
Published: 2014
Online Access:http://www.scopus.com/inward/record.url?eid=2-s2.0-35048826242&partnerID=40&md5=a6dd20591be90da119e5e2fdfbe789e1
http://cmuir.cmu.ac.th/handle/6653943832/6307
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Chiang Mai University
Language: English
id th-cmuir.6653943832-6307
record_format dspace
spelling th-cmuir.6653943832-63072014-08-30T03:24:04Z The EAX mode of operation Bellare M. Rogaway P. Wagner D. We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and the mode uses 2[|M|/n] + [|H|/n] + [|N|/n] block-cipher calls when these strings are nonempty and n is the block length of the underlying block cipher. Among EAX's characteristics are that it is on-line (the length of a message isn't needed to begin processing it) and a fixed header can be pre-processed, effectively removing the per-message cost of binding it to the ciphertext. © International Association for Cryptologic Research 2004. 2014-08-30T03:24:04Z 2014-08-30T03:24:04Z 2004 Article 03029743 http://www.scopus.com/inward/record.url?eid=2-s2.0-35048826242&partnerID=40&md5=a6dd20591be90da119e5e2fdfbe789e1 http://cmuir.cmu.ac.th/handle/6653943832/6307 English
institution Chiang Mai University
building Chiang Mai University Library
country Thailand
collection CMU Intellectual Repository
language English
description We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and the mode uses 2[|M|/n] + [|H|/n] + [|N|/n] block-cipher calls when these strings are nonempty and n is the block length of the underlying block cipher. Among EAX's characteristics are that it is on-line (the length of a message isn't needed to begin processing it) and a fixed header can be pre-processed, effectively removing the per-message cost of binding it to the ciphertext. © International Association for Cryptologic Research 2004.
format Article
author Bellare M.
Rogaway P.
Wagner D.
spellingShingle Bellare M.
Rogaway P.
Wagner D.
The EAX mode of operation
author_facet Bellare M.
Rogaway P.
Wagner D.
author_sort Bellare M.
title The EAX mode of operation
title_short The EAX mode of operation
title_full The EAX mode of operation
title_fullStr The EAX mode of operation
title_full_unstemmed The EAX mode of operation
title_sort eax mode of operation
publishDate 2014
url http://www.scopus.com/inward/record.url?eid=2-s2.0-35048826242&partnerID=40&md5=a6dd20591be90da119e5e2fdfbe789e1
http://cmuir.cmu.ac.th/handle/6653943832/6307
_version_ 1681420589216038912