EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE

Robert P. McEvoy, Colin C. Murphy

Abstract

All-or-Nothing Encryption is a useful technique which can heighten the security of block ciphers. It can also be used to design faster symmetric-key cryptosystems, by decreasing the number of required encryption operations at run-time. An open problem in the literature regards the speed of all-or-nothing encryption, which we address in this paper by combining two techniques from the literature, forming a new all-or-nothing mode of operation. Trade-offs in the implementation of this design are considered, and theoretical proofs of security are provided.

References

  1. Bellare, M. and Boldyreva, A. (2000). The Security of Chaffing and Winnowing. In ASIACRYPT'00, volume 1976 of Lecture Notes in Computer Science, pages 517-530. Springer.
  2. Bellare, M., Desai, A., Jokipii, E., and Rogaway, P. (1997). A Concrete Security Treatment of Symmetric Encryption. In FOCS'97, pages 394-403.
  3. Berman, V. (2005). Enhancing Data Security in Mobile Ad Hoc Networks via Multipath Routing and Directional Transmission. Master's thesis, University of California, Davis.
  4. Boyko, V. (2000). On All-or-Nothing Transforms and Password Authenticated Key Exchange Protocols. PhD thesis, Massachusetts Institute of Technology.
  5. Byers, J., Considine, J., Itkis, G., Cheng, M. C., and Yeung, A. (2006). Securing bulk content almost for free. Journal of Computer Communications, Special Issue on Internet Security, 29:290-290.
  6. Desai, A. (2000). The Security of All-or-Nothing Encryption (Extended Abstract). In CRYPTO'00, volume 1880 of Lecture Notes in Computer Science, pages 359-375. Springer. Full version retrieved online, June 2006. http://www.cs.ucsd.edu/ users/adesai/.
  7. Dodis, Y. (2000). Exposure-Resilient Cryptography. PhD thesis, Massachusetts Institute of Technology.
  8. Dodis, Y., Sahai, A., and Smith, A. (2001). On Perfect and Adaptive Security in Exposure-Resilient Cryptography. In EUROCRYPT'01, volume 2045 of Lecture Notes in Computer Science, pages 301-324. Springer.
  9. ECRYPT (2006). ECRYPT Yearly Report on Algorithms and Keysizes (2005). http://www.ecrypt.eu.org.
  10. Johnson, D., Matyas, S., and Peyravian, M. (1996). Encryption of Long Blocks Using a Short-Block Encryption Procedure. Submitted for inclusion in the IEEE P1363a standard.
  11. Kiong, N. C. and Samsudin, A. (2003). A Concrete Security Treatment of Symmetric Encryption. In APCC'03, volume 2, pages 838-843.
  12. Lipmaa, H., Rogaway, P., and Wagner, D. (2000). CTRMode Encryption. Comments to NIST concerning AES Modes of Operation.
  13. Marnas, S. I., Angelis, L., and Bleris, G. L. (2003). AllOr-Nothing Transforms Using Quasigroups. In Proc. of 1st Balkan Conference on Informatics, pages 183- 191.
  14. Peterson, Z. N. J., Burns, R. C., Herring, J., Stubblefield, A., and Rubin, A. D. (2005). Secure Deletion for a Versioning File System. In FAST'05. USENIX.
  15. Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28(4):656- 715.
  16. Zhang, R., Hanaoka, G., and Imai, H. (2004a). On the Security of Cryptosystems with All-or-Nothing Transform. In ACNS'04, volume 3089 of Lecture Notes in Computer Science, pages 76-90. Springer.
  17. Zhang, R., Hanaoka, G., Shikata, J., and Imai, H. (2004b). On the Security of Multiple Encryption or CCAsecurity+CCA-security=CCA-security? In PKC 7804, volume 2947 of Lecture Notes in Computer Science, pages 360-374. Springer.
Download


Paper Citation


in Harvard Style

P. McEvoy R. and C. Murphy C. (2006). EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 237-245. DOI: 10.5220/0002098902370245


in Bibtex Style

@conference{secrypt06,
author={Robert P. McEvoy and Colin C. Murphy},
title={EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={237-245},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002098902370245},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE
SN - 978-972-8865-63-4
AU - P. McEvoy R.
AU - C. Murphy C.
PY - 2006
SP - 237
EP - 245
DO - 10.5220/0002098902370245