You are looking at a specific version 20030828:131826 of this paper. See the latest version.

Paper 2003/177

Building Secure Cryptographic Transforms, or How to Encrypt and MAC

Tadayoshi Kohno and Adriana Palacio and John Black

Abstract

We describe several notions of ``cryptographic transforms,'' symmetric schemes designed to meet a variety of privacy and authenticity goals. We consider goals, such as replay-avoidance and in-order packet delivery, that have not been fully addressed in previous works in this area. We then provide an analysis of possible ways to combine standard encryption and message authentication schemes in order to provably meet these goals. Our results further narrow the gap between the provable-security results from the theoretical community and the needs of developers who implement real systems.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
Applied cryptographycryptographic transformsauthenticated encryptionprivacyauthenticitysecurity proofs
Contact author(s)
tkohno @ cs ucsd edu
History
2003-08-28: received
Short URL
https://ia.cr/2003/177
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.