期刊文献+

基于双重分组和密钥计数的并行认证模式

Parallel Authentication Modes Based on Double Blocks or Key Counter
下载PDF
导出
摘要 由于CBC -MAC模式不可并行处理 ,提出了一种基于双重分组的并行认证模式 (PKCB)。PKCB模式同并行认证模式PMAC相比 ,安全性和速率都有显著提高 ,PKCB认证模式与CTR (计数器 )加密模式结合可构成分组密码算法的一种全工作模式。在此基础上提出了一种基于密钥计数的并行认证模式 (KCTR -MAC)。KCTR -MAC模式安全性比PMAC模式高得多 ,而速率未降低 ,KCTR -MAC认证模式和CTR加密模式结合也可构成分组密码算法的一种全工作模式 (2CTR) ,2CTR模式的综合性能不亚于标准模式CCM (CTRwithCBC -MAC) ,是一种安全快速的实用模式。 The CBC-MAC mode is not a parallel one. A parallel authentication mode (PKCB) based on double blocks was put forward in this paper. The PKCB mode had a marked improvement on security & speed over parallel authentication mode,PMAC. And it may be combined with the CTR (counter) encryption mode to form a full block cipher mode. On this ground,another parallel authentication mode (KCTR-MAC) based on key counter was advanced. As compared with the PMAC mode,the KCTR-MAC mode had a marked improvement on security,while its speed did not become lower. The KCTR-MAC authentication mode may be combined with the CTR (counter) encryption mode to form a full block cipher mode (2CTR),too. The 2CTR mode had a performance advantage over the standard mode,CCM (CTR with CBC-MAC). And it was a fast,practicable mode with security.
出处 《中国工程科学》 2004年第7期70-74,共5页 Strategic Study of CAE
基金 "八六三"高技术计划资助项目 (2 0 0 2AA14 3 0 10 2 0 0 3AA14 3 0 40 )
关键词 认证模式 CBC-MAC模式 PMAC模式 CTR模式 CCM模式 authentication mode CBC-MAC mode PMAC mode CTR mode CCM mode
  • 相关文献

参考文献19

  • 1Gladman B. A specification for Rijndael, the AES algorithm (V3.3) [EB/OL].http: //fp.gladman.plus.com/cryptography-technology/rijndael/aesspec.pdf, 2002
  • 2Touch J. Report on MD5 Performance [EB/OL]. RFC1810, http://www.china-pub. com/computers/emook/aboutemook.htm, 1995
  • 3NIST. Secure Hash Standard [S]. FIPS 180-1, 1995
  • 4NIST. Secure Hash Standard [S]. FIPS 180-2, 2002
  • 5ISO/IEC/JTC 1/SC 27. Information processing - modes of operation for a 64 bit block cipher algorithm [S]. ISO8372, http://www.eos.org.eg/web-en/cat/items/d15530.html, 1987
  • 6Black J,Rogaway P. XCBC MAC [EB/OL]. http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/, 2001
  • 7Jaulmes E,Joux A,Valette F. RMAC [EB/OL]. http://csrc.nist.gov/CryptoToolkit/modes/, 2001
  • 8Housley R, Whiting D, Ferguson N. CCM: AES Mode of Operation[EB/OL]. http://csrc.nist.gov/encryption/modes/proposedmodes/, 2002
  • 9Lipmaa H, Rogaway P, Wagner D. CTR Mode Encryption [EB/OL]. http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/ , 2001
  • 10Rogaway P,Black J. PMAC [EB/OL]. http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/, 2001

二级参考文献9

  • 1[1]NATIONAL BUREAU OF STANDARDS(USA). DES Modes of Operation. Federal Information Processing Standard(FIPS) Publication81,1980; http://www. itl. nist. gov/div897/pubs/fip81. htm
  • 2[2]ht tp://www. nist. gov/modes/
  • 3[3]M Bellare, A Desai, E Jokipii, P Rogaway. A Concrete Security Treatment of Symmetric Encryption. In: Proceedings of the 38th Symposium on Foundations Computer Science, IEEE, 1997,394~403
  • 4[4]M Bellare,J killian, P Rogaway. The Security of Cipher Block Chaining. Advances in Cryptology-CRYPTO'94,1995.341~358
  • 5[5]M Bellare, C Namprempre. Authenticated encryption:Relations Among Notions and Analysis of Generic Composition Paradigm. Advances in Cryptology-ASIACRYPT'00, Springer-Verlag, 2000
  • 6[6]V D Gligor, P Donescu. Integrity Conditions for Symmetric Encryption. In: University of Maryland. Computer Science Technical Report CS-TR-3958, 1998
  • 7[7]C S Jutla. Encryption Modes with Almost Free Message Integrity. Advances in Cryptology-EUROCRYPT'01, LNCS2045. SpringerVerlag, 2001
  • 8[8]M Luby, C Rackoff. How to Construct Pseudorandom Permutations From Pseudorandom Function. SIAM J Computing. 1998, 17(2)
  • 9[9]J Katz, M Yung. Unforgrable Encryption and Adaptively Secure Modes of Operation. Fast Software Encryption'00. Springer-Verlag2000

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部