Cryptology ePrint Archive: Report 2003/177

Building Secure Cryptographic Transforms, or How to Encrypt and MAC

Tadayoshi Kohno and Adriana Palacio and John Black

Abstract: We describe several notions of ``cryptographic transforms,'' symmetric schemes designed to meet a variety of privacy and authenticity goals. We consider goals, such as replay-avoidance and in-order packet delivery, that have not been fully addressed in previous works in this area. We then provide an analysis of possible ways to combine standard encryption and message authentication schemes in order to provably meet these goals. Our results further narrow the gap between the provable-security results from the theoretical community and the needs of developers who implement real systems.

Category / Keywords: cryptographic protocols / Applied cryptography, cryptographic transforms, authenticated encryption, privacy, authenticity, security proofs

Date: received 28 Aug 2003

Contact author: tkohno at cs ucsd edu

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Version: 20030828:131826 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]