Results 1 to 10 of about 1,634 (284)
Recommendation for block cipher modes of operation :
This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC are modes of operation for an underlying approved symmetric key block cipher.
M J Dworkin
semanticscholar +5 more sources
Counter Chain: A New Block Cipher Mode of Operation
In this paper, we propose a novel block cipher mode of operation, which is known as the counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining (CBC) block cipher mode of operation with the counter (CTR) mode in a consistent fashion.
Aly M. El-Semary +1 more
semanticscholar +4 more sources
Automated Proofs of Block Cipher Modes of Operation [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Martin Gagné +3 more
semanticscholar +7 more sources
Counter Mode Development for Block Cipher Operations [PDF]
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj +2 more sources
COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj +3 more sources
Automated Analysis and Synthesis of Block-Cipher Modes of Operation [PDF]
Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks. Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary length messages using any underlying block cipher. A mode of operation can be proven secure (say, against chosen-plaintext attacks) based on the assumption ...
Alex J. Malozemoff +2 more
openalex +3 more sources
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
The use of a small block length is a common strategy when designing lightweight (tweakable) block ciphers (TBCs), and several 64-bit primitives have been proposed. However, when such a 64-bit primitive is used for an authenticated encryption with birthday-bound security, it has only 32-bit data complexity, which is subject to practical attacks.
Yusuke Naito, Takeshi Sugawara
+6 more sources
Known-IV Attacks on Triple Modes of Operation of Block Ciphers [PDF]
With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE'98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E.
Deukjo Hong +6 more
openalex +3 more sources
Some properties of the DEC mode of operation of block ciphers [PDF]
В 2021 году техническим комитетом по стандартизации «Криптографическая защита информации» были приняты новые методические рекомендации, описывающие режим шифрования носителей информации с блочно-ориентированной структурой (далее - режим DEC). Он является модификацией режима гаммирования и учитывает особенности и условия эксплуатации носителей ...
Dmitrii Sergeevich Bogdanov +1 more
openalex +3 more sources
Recommendation for block cipher modes of operation :
Abstract : This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR).
Morris J. Dworkin
openalex +2 more sources

