Paper 2014/627

On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption

Debrup Chakraborty and Palash Sarkar

Abstract

This work deals with the various requirements of encryption and authentication in cryptographic applications. The approach is to construct suitable modes of operations of a block cipher to achieve the relevant goals. A variety of schemes suitable for specific applications are presented. While none of the schemes are built completely from scratch, there is a common unifying framework which connects them. All the schemes described have been implemented and the implementation details are publicly available. Performance figures are presented when the block cipher is the AES and the Intel AES-NI instructions are used. These figures suggest that the constructions presented here compare well with previous works such as the famous OCB mode of operation. In terms of features, the constructions provide several new offerings which are not present in earlier works. This work significantly widens the range of choices of an actual designer of cryptographic system.

Note: The AE (and hence the AEAD) schemes were incorrect. This version updates these schemes. It also simplifies and improves the masking strategies and provides updated timing results.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
authenticationauthenticated encryptionGalois field maskingblock cipher
Contact author(s)
palash @ isical ac in
History
2015-01-24: last of 2 revisions
2014-08-20: received
See all versions
Short URL
https://ia.cr/2014/627
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/627,
      author = {Debrup Chakraborty and Palash Sarkar},
      title = {On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption},
      howpublished = {Cryptology ePrint Archive, Paper 2014/627},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/627}},
      url = {https://eprint.iacr.org/2014/627}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.