Green Cryptography: Cleaner Engineering through Recycling

"Green cryptography" is an implementation-centric design paradigm that advocates mature (that is, secure) and minimalist (that is, simple) implementations by recycling cryptographic primitives, components, and design strategies. To exemplify the merits of this recycling-based approach, the authors turn to the Advanced Encryption Standard and examine the pedigree of its predecessors, successors, and various other primitives that it recycles from and that recycle from it. To vouch for its viability as a secure strategy for cryptographic design, the authors also outline a framework for recycling the AES in both message encryption and message authentication, to achieve the strongest notions of confidentiality and integrity.

[1]  Morris J. Dworkin,et al.  SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .

[2]  Justin Troutman The Virtues of Mature and Minimalist Cryptography , 2008, IEEE Security & Privacy.

[3]  Serge Vaudenay,et al.  Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS , 2002, EUROCRYPT.

[4]  Steven M. Bellovin,et al.  Problem Areas for the IP Security Protocols , 1996, USENIX Security Symposium.

[5]  Paulo S. L. M. Barreto,et al.  The MAELSTROM-0 Hash Function , 2006, Anais do VI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2006).

[6]  Chanathip Namprempre,et al.  Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.

[7]  Vincent Rijmen,et al.  The Wide Trail Design Strategy , 2001, IMACC.

[8]  Daniel Bleichenbacher,et al.  Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.

[9]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[10]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[11]  James Manger,et al.  A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 , 2001, CRYPTO.

[12]  Vincent Rijmen,et al.  Security of a Wide Trail Design , 2002, INDOCRYPT.

[13]  Shai Halevi,et al.  Scream: A Software-Efficient Stream Cipher , 2002, FSE.

[14]  Vincent Rijmen,et al.  The WHIRLPOOL Hashing Function , 2003 .

[15]  Hugo Krawczyk,et al.  The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.

[16]  John Black,et al.  Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption , 2002, USENIX Security Symposium.

[17]  Mihir Bellare,et al.  The EAX Mode of Operation , 2004, FSE.