Cryptology ePrint Archive: Report 2014/627
On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
Debrup Chakraborty and Palash Sarkar
Abstract: This work deals with the various requirements of encryption and authentication in cryptographic applications. The approach
is to construct suitable modes of operations of a block cipher to achieve the relevant goals. A variety
of schemes suitable for specific applications are presented. While none of the schemes are built completely from scratch,
there is a common unifying framework which connects them. All the schemes described have been implemented and the implementation
details are publicly available. Performance figures are presented when the block cipher is the AES and the Intel AES-NI
instructions are used. These figures suggest that the constructions presented here compare well with previous works
such as the famous OCB mode of operation. In terms of features, the constructions provide several new offerings which
are not present in earlier works. This work significantly widens the range of choices of an actual designer of
cryptographic system.
Category / Keywords: secret-key cryptography / authentication, authenticated encryption, authenticated encryption with associated data, deterministic authenticated encryption with associated data, Galois field masking, block cipher
Date: received 15 Aug 2014, last revised 23 Jan 2015
Contact author: palash at isical ac in
Available format(s): PDF | BibTeX Citation
Note: The AE (and hence the AEAD) schemes were incorrect. This version updates these schemes. It also simplifies and improves the masking strategies and provides updated timing results.
Version: 20150124:061114 (All versions of this report)
Short URL: ia.cr/2014/627
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]