Paper 2007/029

A General Construction of Tweakable Block Ciphers and Different Modes of Operations

Debrup Chakraborty and Palash Sarkar

Abstract

This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC construction by working over a ring {\ring} and by the use of a masking sequence of functions. The ring {\ring} can be instantiated as either $GF(2^n)$ or as $\bbbz_{2^n}$. Further, over $GF(2^n)$, efficient instantiations of the masking sequence of functions can be done using either a binary Linear Feedback Shift Register (LFSR); a powering construction; a cellular automata map; or by using a word oriented LFSR. Rogaway's TBC construction was built from the powering construction over $GF(2^n)$. Our second contribution is to use the general TBC construction to instantiate constructions of various modes of operations including authenticated encryption (AE) and message authentication code (MAC). In particular, this gives rise to a family of efficient one-pass AE mode of operation. Out of these, the mode of operation obtained by the use of word oriented LFSR promises to provide a masking method which is more efficient than the one used in the well known AE protocol called OCB.

Note: Subsequent to the previous version, we realised that word oriented LFSRs can be used to generate the masks.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. An abridged version of this paper has appeared in the proceedings of Inscrypt 2006.
Keywords
tweakable block ciphermodes of operationsAEMACAEAD.
Contact author(s)
palash @ isical ac in
History
2007-07-26: last of 2 revisions
2007-01-31: received
See all versions
Short URL
https://ia.cr/2007/029
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/029,
      author = {Debrup Chakraborty and Palash Sarkar},
      title = {A General Construction of Tweakable Block Ciphers and Different Modes of Operations},
      howpublished = {Cryptology {ePrint} Archive, Paper 2007/029},
      year = {2007},
      url = {https://eprint.iacr.org/2007/029}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.