Results 1 to 10 of about 1,634 (284)

Recommendation for block cipher modes of operation :

open access: gold, 2007
This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC are modes of operation for an underlying approved symmetric key block cipher.
M J Dworkin
semanticscholar   +5 more sources

Counter Chain: A New Block Cipher Mode of Operation

open access: bronzeJournal of Information Processing Systems, 2015
In this paper, we propose a novel block cipher mode of operation, which is known as the counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining (CBC) block cipher mode of operation with the counter (CTR) mode in a consistent fashion.
Aly M. El-Semary   +1 more
semanticscholar   +4 more sources

Automated Proofs of Block Cipher Modes of Operation [PDF]

open access: greenJournal of Automated Reasoning, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Martin Gagné   +3 more
semanticscholar   +7 more sources

Counter Mode Development for Block Cipher Operations [PDF]

open access: goldAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj   +2 more sources

COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]

open access: diamondمجلة جامعة الانبار للعلوم الصرفة, 2012
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj   +3 more sources

Automated Analysis and Synthesis of Block-Cipher Modes of Operation [PDF]

open access: gold2014 IEEE 27th Computer Security Foundations Symposium, 2014
Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks. Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary length messages using any underlying block cipher. A mode of operation can be proven secure (say, against chosen-plaintext attacks) based on the assumption ...
Alex J. Malozemoff   +2 more
openalex   +3 more sources

Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers

open access: diamondIACR Transactions on Cryptographic Hardware and Embedded Systems, 2019
The use of a small block length is a common strategy when designing lightweight (tweakable) block ciphers (TBCs), and several 64-bit primitives have been proposed. However, when such a 64-bit primitive is used for an authenticated encryption with birthday-bound security, it has only 32-bit data complexity, which is subject to practical attacks.
Yusuke Naito, Takeshi Sugawara
  +6 more sources

Known-IV Attacks on Triple Modes of Operation of Block Ciphers [PDF]

open access: bronze, 2001
With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE'98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E.
Deukjo Hong   +6 more
openalex   +3 more sources

Some properties of the DEC mode of operation of block ciphers [PDF]

open access: bronzeМатематические вопросы криптографии, 2022
В 2021 году техническим комитетом по стандартизации «Криптографическая защита информации» были приняты новые методические рекомендации, описывающие режим шифрования носителей информации с блочно-ориентированной структурой (далее - режим DEC). Он является модификацией режима гаммирования и учитывает особенности и условия эксплуатации носителей ...
Dmitrii Sergeevich Bogdanov   +1 more
openalex   +3 more sources

Recommendation for block cipher modes of operation :

open access: gold, 2001
Abstract : This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR).
Morris J. Dworkin
openalex   +2 more sources

Home - About - Disclaimer - Privacy