Cryptology ePrint Archive: Report 2003/177
Building Secure Cryptographic Transforms, or How to Encrypt and MAC
Tadayoshi Kohno and Adriana Palacio and John Black
Abstract: We describe several notions of ``cryptographic transforms,''
symmetric schemes designed to meet a variety of privacy and
authenticity goals. We consider goals, such as replay-avoidance and
in-order packet delivery, that have not been fully addressed in
previous works in this area. We then provide an analysis of
possible ways to combine standard encryption and message
authentication schemes in order to provably meet these
goals. Our results further narrow the gap between
the provable-security results from the theoretical community and the
needs of developers who implement real systems.
Category / Keywords: cryptographic protocols / Applied cryptography, cryptographic transforms, authenticated encryption, privacy, authenticity, security proofs
Date: received 28 Aug 2003
Contact author: tkohno at cs ucsd edu
Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20030828:131826 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]