4.2 Article

IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes

期刊

SECURITY AND COMMUNICATION NETWORKS
卷 8, 期 18, 页码 3939-3952

出版社

WILEY-HINDAWI
DOI: 10.1002/sec.1312

关键词

privacy; integrity; indicator; authenticated encryption; low latency; low jitter; real-time

资金

  1. Ministry of Science and Technology [MOST 103-2221-E-006-177]
  2. Ministry of Science and Technology, Taiwan

向作者/读者索取更多资源

It is highly desirable that a real-time crypto system should be designed to offer a strong security level by assuring both the privacy and integrity together in the same podium. However, the conventional stream cipher modes of operation (counter (CTR), cipher feedback (CFB), and Output Feedback (OFB)), often used in several real-time applications, are unable to prevent any unauthorized message modification, which may often lead to several active attacks. This article shows a way to construct the real-time based Authenticated Encryption (AE) environment, where the real-time key stream is generated from any secure block algorithm like Advanced Encryption Standard (AES). Accordingly, in order to demonstrate the principle of the real-time based AE environment, here we introduce two modes of operations, namely integrity aware real-time based counter (IAR-CTR) and cipher feedback (IAR-CFB) modes, where both the proposed modes of operations can guarantee to offer both the confidentiality and message integrity in a single pass without any Message Authentication Code (MAC) or even any kind of non-crypto checksum Cyclic Redundancy Check (CRC) support. Besides, here we argue that both the proposed real-time based AE environments are quite robust against several active attacks, for example, message stream modification attacks and chosenplain-text attacks, and at the same time, they can also be useful to deal with some other issues like 'limited error propagation' existing in several conventional stream cipher modes like CFB, OFB, and CTR. Copyright (C) 2015 John Wiley & Sons, Ltd.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据