IAR-CTR and IAR-CFB: Integrity aware real-time based counter and cipher feedback modes

Tzonelih Hwang, Prosanta Gope

研究成果: Article同行評審

8 引文 斯高帕斯(Scopus)

摘要

It is highly desirable that a real-time crypto system should be designed to offer a strong security level by assuring both the privacy and integrity together in the same podium. However, the conventional stream cipher modes of operation (counter (CTR), cipher feedback (CFB), and Output Feedback (OFB)), often used in several real-time applications, are unable to prevent any unauthorized message modification, which may often lead to several active attacks. This article shows a way to construct the real-time based Authenticated Encryption (AE) environment, where the real-time key stream is generated from any secure block algorithm like Advanced Encryption Standard (AES). Accordingly, in order to demonstrate the principle of the real-time based AE environment, here we introduce two modes of operations, namely integrity aware real-time based counter (IAR-CTR) and cipher feedback (IAR-CFB) modes, where both the proposed modes of operations can guarantee to offer both the confidentiality and message integrity in a single pass without any Message Authentication Code (MAC) or even any kind of non-crypto checksum Cyclic Redundancy Check (CRC) support. Besides, here we argue that both the proposed real-time based AE environments are quite robust against several active attacks, for example, message stream modification attacks and chosen-plain-text attacks, and at the same time, they can also be useful to deal with some other issues like 'limited error propagation' existing in several conventional stream cipher modes like CFB, OFB, and CTR.

原文English
頁(從 - 到)3939-3952
頁數14
期刊Security and Communication Networks
8
發行號18
DOIs
出版狀態Published - 2015 十二月 1

All Science Journal Classification (ASJC) codes

  • 資訊系統
  • 電腦網路與通信

指紋

深入研究「IAR-CTR and IAR-CFB: Integrity aware real-time based counter and cipher feedback modes」主題。共同形成了獨特的指紋。

引用此