2002
DOI: 10.1007/3-540-45473-x_8
|View full text |Cite
|
Sign up to set email alerts
|

Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

Abstract: We present the eXtended Ciphertext Block Chaining (XCBC) and the eXtended Electronic Codebook (XECB) encryption schemes or modes of encryption that can detect encrypted-message forgeries with high probability even when used with typical noncryptographic Manipulation Detection Code (MDC) functions (e.g., bitwise exclusive-or and cyclic redundancy code (CRC) functions). These modes detect encrypted-message forgeries at low cost in performance, power, and implementation, and preserve both message secrecy and inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
95
0

Year Published

2003
2003
2016
2016

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 109 publications
(97 citation statements)
references
References 17 publications
0
95
0
Order By: Relevance
“…These include schemes that do not surface the IV, for example encrypted-IV schemes like CBC2 [41], IACBC [28] and XCBC$ [20].…”
Section: The Biased-ciphertext Attackmentioning
confidence: 99%
“…These include schemes that do not surface the IV, for example encrypted-IV schemes like CBC2 [41], IACBC [28] and XCBC$ [20].…”
Section: The Biased-ciphertext Attackmentioning
confidence: 99%
“…Therefore, from the attacker side, adversaries in the IND security game can adapt the message blocks according to the previously received ciphertext blocks. The same notion concerning integrity on real-time applications has been used by Gennaro and Rohatgi [4].…”
Section: Introductionmentioning
confidence: 93%
“…The formal notion of authenticated encryption systems was introduced independently by Katz and Yung in [45], and by Bellare and Rogaway in [13]. Since then, many dedicated authenticated encryption schemes have been proposed, such as, RPC of Katz and Yung [45], XECB of Gligor and Donescu [35], IAPM of Jutla [43], OCB of Rogaway et al [60], and EAX of Bellare et al [14]. A noteworthy point is that all secure dedicated authenticated encryption primitives are blockcipher based.…”
Section: Background and Related Workmentioning
confidence: 99%