Affiliation:
1. Indian Statistical Institute
Abstract
We revisit the problem of constructing a protocol for performing Authenticated Encryption with Associated Data (AEAD). A technique is described which combines a collision-resistant hash function with a protocol for Authenticated Encryption (AE). The technique is both simple and generic and does not require any additional key material beyond that of the AE protocol. Concrete instantiations are shown where a 256-bit hash function is combined with some known single-pass AE protocols employing either 128-bit or 256-bit block ciphers. This results in possible efficiency improvement in the processing of the header.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference15 articles.
1. A General Construction of Tweakable Block Ciphers and Different Modes of Operations
2. Daemen J. and Rijmen V. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer. Daemen J. and Rijmen V. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer.
3. Federal Information Processing Standard. Publication 180-2. U.S. Department of Commerce National Institute of Standards and Technology(NIST). http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf. Federal Information Processing Standard. Publication 180-2. U.S. Department of Commerce National Institute of Standards and Technology(NIST). http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf.
Cited by
106 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献