Tweakable Enciphering Schemes From Stream Ciphers With IV

We present the first construction of a tweakable enciphering scheme from a stream cipher supporting an initialization vector. This construction can take advantage of the recent advances in hardware efficient stream ciphers to yield disk encryption systems with a very small hardware footprint. Such systems will be attractive for resource constrained devices.

[1]  David A. Wagner,et al.  Tweakable Block Ciphers , 2002, CRYPTO.

[2]  Palash Sarkar,et al.  Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions , 2009, IEEE Transactions on Information Theory.

[3]  Palash Sarkar,et al.  HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach , 2006, INDOCRYPT.

[4]  Palash Sarkar,et al.  A General Construction of Tweakable Block Ciphers and Different Modes of Operations , 2008, IEEE Transactions on Information Theory.

[5]  Toshiyasu Matsushima,et al.  Tweakable Enciphering Schemes from Hash-Sum-Expansion , 2007, INDOCRYPT.

[6]  Henri Gilbert,et al.  On the Security of IV Dependent Stream Ciphers , 2007, FSE.

[7]  Kaoru Kurosawa,et al.  How to Construct Super-Pseudorandom Permutations with Short Keys , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[8]  Shai Halevi,et al.  Invertible Universal Hashing and the TET Encryption Mode , 2007, CRYPTO.

[9]  Shai Halevi,et al.  A Parallelizable Enciphering Mode , 2004, CT-RSA.

[10]  Scott R. Fluhrer,et al.  The Extended Codebook (XCB) Mode of Operation , 2004, IACR Cryptol. ePrint Arch..

[11]  Palash Sarkar,et al.  A general mixing strategy for the ECB-Mix-ECB mode of operation , 2008, Inf. Process. Lett..

[12]  P. Sarkar A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices , 2008 .

[13]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[14]  Peng Wang,et al.  HCTR: A Variable-Input-Length Enciphering Mode , 2005, CISC.

[15]  Palash Sarkar Tweakable enciphering schemes using only the encryption function of a block cipher , 2011, Inf. Process. Lett..

[16]  Shai Halevi,et al.  A Tweakable Enciphering Mode , 2003, CRYPTO.

[17]  M. Rabin,et al.  Fast evaluation of polynomials by rational preparation , 1972 .