Arguments for Tweakable Block Cipher-Based Cryptography
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers, 2021As discussed in Sect. 1.3, a TBC is a variant of a BC that accepts a public tweak to change its behavior. TBC-based AEAD designs have a lot of nice performance and security features that we will discuss in this chapter. First, we give an early history of TBC designs in Sect. 4.1. Then, we discuss the impact of the TWEAKEY framework in Sect. 4.2.
Mustafa Khairallah
semanticscholar +2 more sources
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
IACR Cryptology ePrint Archive, 2022Shoichi Hirose, Kazuhiko Minematsu
semanticscholar +2 more sources
Compactly Committing Authenticated Encryption Using Tweakable Block Cipher
International Conference on Network and System Security, 2020Message franking is a cryptographic scheme introduced in the Facebook end-to-end encrypted messaging system. It enables users to report abusive messages to Facebook in a verifiable manner. Grubbs, Lu and Ristenpart initiated theoretical study of message franking.
Shoichi Hirose
semanticscholar +2 more sources
Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher
Web Information System and Application Conference, 2022Shoichi Hirose
semanticscholar +2 more sources
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
IACR Cryptology ePrint Archive, 2019Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-scale applications in symmetric-key schemes. At a high level, it provides flexibility in design and (possibly) better security bounds. In multi-keyed applications, a TBC with short tweak values can be used to replace multiple keys.
Avik Chakraborti +5 more
semanticscholar +2 more sources
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019Tweakable block cipher (TBC) is an extension of conventional block cipher. We study how to build a TBC based on generalized Feistel structure (GFS), a classical block cipher construction. While known dedicated TBC proposals are based on substitution-permutation network (SPN), GFS has not been used for building TBC.
Kosei Sakamoto +8 more
semanticscholar +2 more sources
A Summary of the Security of Tweakable Block Ciphers Against Simon's Quantum Algorithm
2025 10th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA)Tweakable block ciphers are more flexible than traditional block ciphers and widely used in modes of operation such as MAC and authenticated encryption.
Jianfeng Ruan +3 more
semanticscholar +2 more sources
Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher
Provable Security, 2018We present a Single-key Length Doubler built on an n-bit Tweakable block cipher (SLDT), which is a length-preserving cipher on the strings with bit length in integer interval \(\left[ n, n+1, \ldots , 2n-1\right] \). SLDT is mainly motivated to reduce the key material size of a length doubler proposed by Chen et al. at FSE2018, since the key management
Xiangyang Zhang +6 more
semanticscholar +2 more sources
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers [PDF]
We propose the Synthetic Counter-in-Tweak $$\mathsf {SCT}$$ mode, which turns a tweakable block cipher into a nonce-based authenticated encryption scheme with associated data. The $$\mathsf {SCT}$$ mode combines in a SIV-like manner a Wegman-Carter MAC inspired from $$\mathsf {PMAC}$$ for the authentication part and a new counter-like mode for the ...
Thomas Peyrin, Y. Seurin
semanticscholar +2 more sources
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
Annual International Cryptology Conference, 2017We propose a new mode of operation called \(\mathsf {ZMAC}\) allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with n-bit blocks and t-bit tweaks, our construction provides security (as a variable-input-length PRF) beyond the birthday bound with respect to the ...
Tetsu Iwata +3 more
semanticscholar +2 more sources

