Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC
We describe highly efficient constructions, XE and XEX, that turn a blockcipher E: K x{0, 1}n → {0, 1}n into a tweakable blockcipher Ẽ: K x T x {0, 1}n → {0, 1}n having tweak space T = {0,1}n II where II is a set of tuples of integers such as II = [1.. 2n/2] X [0.. 10]. When tweak T is obtained from...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
2014
|
Online Access: | http://www.scopus.com/inward/record.url?eid=2-s2.0-33644958567&partnerID=40&md5=5849bafd83d2fe1fcde0718945018b40 http://cmuir.cmu.ac.th/handle/6653943832/6482 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Chiang Mai University |
Language: | English |
id |
th-cmuir.6653943832-6482 |
---|---|
record_format |
dspace |
spelling |
th-cmuir.6653943832-64822014-08-30T03:24:16Z Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC Rogaway P. We describe highly efficient constructions, XE and XEX, that turn a blockcipher E: K x{0, 1}n → {0, 1}n into a tweakable blockcipher Ẽ: K x T x {0, 1}n → {0, 1}n having tweak space T = {0,1}n II where II is a set of tuples of integers such as II = [1.. 2n/2] X [0.. 10]. When tweak T is obtained from tweak S by incrementing one if its numerical components, the cost to compute ẼTK (M) having already computed some ẼSK(M′) is one blockcipher call plus a small and constant number of elementary machine operations. Our constructions work by associating to the ith coordinate of II an element αi ∈ F*2n and multiplying by αi when one increments that component of the tweak. We illustrate the use of this approach by refining the authenticated-encryption scheme OCB and the message authentication code PMAC, yielding variants of these algorithms that are simpler and faster than the original schemes, and yet have simpler proofs. Our results bolster the thesis of Liskov, Rivest, and Wagner [10] that a desirable approach for designing modes of operation is to start from a tweakable blockcipher. We elaborate on their idea, suggesting the kind of tweak space, usage-discipline, and blockcipher-based instantiations that give rise to simple and efficient modes. © International Association for Cryptologic Research 2004. 2014-08-30T03:24:16Z 2014-08-30T03:24:16Z 2004 Article 03029743 http://www.scopus.com/inward/record.url?eid=2-s2.0-33644958567&partnerID=40&md5=5849bafd83d2fe1fcde0718945018b40 http://cmuir.cmu.ac.th/handle/6653943832/6482 English |
institution |
Chiang Mai University |
building |
Chiang Mai University Library |
country |
Thailand |
collection |
CMU Intellectual Repository |
language |
English |
description |
We describe highly efficient constructions, XE and XEX, that turn a blockcipher E: K x{0, 1}n → {0, 1}n into a tweakable blockcipher Ẽ: K x T x {0, 1}n → {0, 1}n having tweak space T = {0,1}n II where II is a set of tuples of integers such as II = [1.. 2n/2] X [0.. 10]. When tweak T is obtained from tweak S by incrementing one if its numerical components, the cost to compute ẼTK (M) having already computed some ẼSK(M′) is one blockcipher call plus a small and constant number of elementary machine operations. Our constructions work by associating to the ith coordinate of II an element αi ∈ F*2n and multiplying by αi when one increments that component of the tweak. We illustrate the use of this approach by refining the authenticated-encryption scheme OCB and the message authentication code PMAC, yielding variants of these algorithms that are simpler and faster than the original schemes, and yet have simpler proofs. Our results bolster the thesis of Liskov, Rivest, and Wagner [10] that a desirable approach for designing modes of operation is to start from a tweakable blockcipher. We elaborate on their idea, suggesting the kind of tweak space, usage-discipline, and blockcipher-based instantiations that give rise to simple and efficient modes. © International Association for Cryptologic Research 2004. |
format |
Article |
author |
Rogaway P. |
spellingShingle |
Rogaway P. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC |
author_facet |
Rogaway P. |
author_sort |
Rogaway P. |
title |
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC |
title_short |
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC |
title_full |
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC |
title_fullStr |
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC |
title_full_unstemmed |
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC |
title_sort |
efficient instantiations of tweakable blockciphers and refinements to modes ocb and pmac |
publishDate |
2014 |
url |
http://www.scopus.com/inward/record.url?eid=2-s2.0-33644958567&partnerID=40&md5=5849bafd83d2fe1fcde0718945018b40 http://cmuir.cmu.ac.th/handle/6653943832/6482 |
_version_ |
1681420622038564864 |