EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE
Robert P. McEvoy, Colin C. Murphy
2006
Abstract
All-or-Nothing Encryption is a useful technique which can heighten the security of block ciphers. It can also be used to design faster symmetric-key cryptosystems, by decreasing the number of required encryption operations at run-time. An open problem in the literature regards the speed of all-or-nothing encryption, which we address in this paper by combining two techniques from the literature, forming a new all-or-nothing mode of operation. Trade-offs in the implementation of this design are considered, and theoretical proofs of security are provided.
References
- Bellare, M. and Boldyreva, A. (2000). The Security of Chaffing and Winnowing. In ASIACRYPT'00, volume 1976 of Lecture Notes in Computer Science, pages 517-530. Springer.
- Bellare, M., Desai, A., Jokipii, E., and Rogaway, P. (1997). A Concrete Security Treatment of Symmetric Encryption. In FOCS'97, pages 394-403.
- Berman, V. (2005). Enhancing Data Security in Mobile Ad Hoc Networks via Multipath Routing and Directional Transmission. Master's thesis, University of California, Davis.
- Boyko, V. (2000). On All-or-Nothing Transforms and Password Authenticated Key Exchange Protocols. PhD thesis, Massachusetts Institute of Technology.
- Byers, J., Considine, J., Itkis, G., Cheng, M. C., and Yeung, A. (2006). Securing bulk content almost for free. Journal of Computer Communications, Special Issue on Internet Security, 29:290-290.
- Desai, A. (2000). The Security of All-or-Nothing Encryption (Extended Abstract). In CRYPTO'00, volume 1880 of Lecture Notes in Computer Science, pages 359-375. Springer. Full version retrieved online, June 2006. http://www.cs.ucsd.edu/ users/adesai/.
- Dodis, Y. (2000). Exposure-Resilient Cryptography. PhD thesis, Massachusetts Institute of Technology.
- Dodis, Y., Sahai, A., and Smith, A. (2001). On Perfect and Adaptive Security in Exposure-Resilient Cryptography. In EUROCRYPT'01, volume 2045 of Lecture Notes in Computer Science, pages 301-324. Springer.
- ECRYPT (2006). ECRYPT Yearly Report on Algorithms and Keysizes (2005). http://www.ecrypt.eu.org.
- Johnson, D., Matyas, S., and Peyravian, M. (1996). Encryption of Long Blocks Using a Short-Block Encryption Procedure. Submitted for inclusion in the IEEE P1363a standard.
- Kiong, N. C. and Samsudin, A. (2003). A Concrete Security Treatment of Symmetric Encryption. In APCC'03, volume 2, pages 838-843.
- Lipmaa, H., Rogaway, P., and Wagner, D. (2000). CTRMode Encryption. Comments to NIST concerning AES Modes of Operation.
- Marnas, S. I., Angelis, L., and Bleris, G. L. (2003). AllOr-Nothing Transforms Using Quasigroups. In Proc. of 1st Balkan Conference on Informatics, pages 183- 191.
- Peterson, Z. N. J., Burns, R. C., Herring, J., Stubblefield, A., and Rubin, A. D. (2005). Secure Deletion for a Versioning File System. In FAST'05. USENIX.
- Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28(4):656- 715.
- Zhang, R., Hanaoka, G., and Imai, H. (2004a). On the Security of Cryptosystems with All-or-Nothing Transform. In ACNS'04, volume 3089 of Lecture Notes in Computer Science, pages 76-90. Springer.
- Zhang, R., Hanaoka, G., Shikata, J., and Imai, H. (2004b). On the Security of Multiple Encryption or CCAsecurity+CCA-security=CCA-security? In PKC 7804, volume 2947 of Lecture Notes in Computer Science, pages 360-374. Springer.
Paper Citation
in Harvard Style
P. McEvoy R. and C. Murphy C. (2006). EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 237-245. DOI: 10.5220/0002098902370245
in Bibtex Style
@conference{secrypt06,
author={Robert P. McEvoy and Colin C. Murphy},
title={EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={237-245},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002098902370245},
isbn={978-972-8865-63-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE
SN - 978-972-8865-63-4
AU - P. McEvoy R.
AU - C. Murphy C.
PY - 2006
SP - 237
EP - 245
DO - 10.5220/0002098902370245