A Modular Framework for Building Variable-Input-Length Tweakable Ciphers

  • Thomas Shrimpton
  • R. Seth Terashima
Conference paper

DOI: 10.1007/978-3-642-42033-7_21

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8269)
Cite this paper as:
Shrimpton T., Terashima R.S. (2013) A Modular Framework for Building Variable-Input-Length Tweakable Ciphers. In: Sako K., Sarkar P. (eds) Advances in Cryptology - ASIACRYPT 2013. ASIACRYPT 2013. Lecture Notes in Computer Science, vol 8269. Springer, Berlin, Heidelberg

Abstract

We present the Protected-IV construction (PIV) a simple, modular method for building variable-input-length tweakable ciphers. At our level of abstraction, many interesting design opportunities surface. For example, an obvious pathway to building beyond birthday-bound secure tweakable ciphers with performance competitive with existing birthday-bound-limited constructions. As part of our design space exploration, we give two fully instantiated PIV constructions, TCT1 and TCT2; the latter is fast and has beyond birthday-bound security, the former is faster and has birthday-bound security. Finally, we consider a generic method for turning a VIL tweakable cipher (like PIV) into an authenticated encryption scheme that admits associated data, can withstand nonce-misuse, and allows for multiple decryption error messages. Thus, the method offers robustness even in the face of certain sidechannels, and common implementation mistakes.

Keywords

tweakable blockciphers beyond-birthday-bound security authenticated encryption associated data full-disk encryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Thomas Shrimpton
    • 1
  • R. Seth Terashima
    • 1
  1. 1.Dept. of Computer SciencePortland State UniversityUSA

Personalised recommendations