The EAX mode of operation
We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
2014
|
Online Access: | http://www.scopus.com/inward/record.url?eid=2-s2.0-35048826242&partnerID=40&md5=a6dd20591be90da119e5e2fdfbe789e1 http://cmuir.cmu.ac.th/handle/6653943832/6307 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Chiang Mai University |
Language: | English |
id |
th-cmuir.6653943832-6307 |
---|---|
record_format |
dspace |
spelling |
th-cmuir.6653943832-63072014-08-30T03:24:04Z The EAX mode of operation Bellare M. Rogaway P. Wagner D. We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and the mode uses 2[|M|/n] + [|H|/n] + [|N|/n] block-cipher calls when these strings are nonempty and n is the block length of the underlying block cipher. Among EAX's characteristics are that it is on-line (the length of a message isn't needed to begin processing it) and a fixed header can be pre-processed, effectively removing the per-message cost of binding it to the ciphertext. © International Association for Cryptologic Research 2004. 2014-08-30T03:24:04Z 2014-08-30T03:24:04Z 2004 Article 03029743 http://www.scopus.com/inward/record.url?eid=2-s2.0-35048826242&partnerID=40&md5=a6dd20591be90da119e5e2fdfbe789e1 http://cmuir.cmu.ac.th/handle/6653943832/6307 English |
institution |
Chiang Mai University |
building |
Chiang Mai University Library |
country |
Thailand |
collection |
CMU Intellectual Repository |
language |
English |
description |
We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N, a message M, and a header H, our mode protects the privacy of M and the authenticity of both M and H. Strings N, M, and H are arbitrary bit strings, and the mode uses 2[|M|/n] + [|H|/n] + [|N|/n] block-cipher calls when these strings are nonempty and n is the block length of the underlying block cipher. Among EAX's characteristics are that it is on-line (the length of a message isn't needed to begin processing it) and a fixed header can be pre-processed, effectively removing the per-message cost of binding it to the ciphertext. © International Association for Cryptologic Research 2004. |
format |
Article |
author |
Bellare M. Rogaway P. Wagner D. |
spellingShingle |
Bellare M. Rogaway P. Wagner D. The EAX mode of operation |
author_facet |
Bellare M. Rogaway P. Wagner D. |
author_sort |
Bellare M. |
title |
The EAX mode of operation |
title_short |
The EAX mode of operation |
title_full |
The EAX mode of operation |
title_fullStr |
The EAX mode of operation |
title_full_unstemmed |
The EAX mode of operation |
title_sort |
eax mode of operation |
publishDate |
2014 |
url |
http://www.scopus.com/inward/record.url?eid=2-s2.0-35048826242&partnerID=40&md5=a6dd20591be90da119e5e2fdfbe789e1 http://cmuir.cmu.ac.th/handle/6653943832/6307 |
_version_ |
1681420589216038912 |