Abstract
Modes of operation adapt block ciphers to many applications. Among the encryption modes, only CFB (Cipher Feedback) has both of the following properties: Firstly it allows transmission units shorter than the block-cipher length to be encrypted and sent without delay and message expansion. Secondly, it can resynchronize after the loss of such transmission units.
However, CFB is inefficient in such applications, since for every transmission unit, regardless how short, a call to the block cipher is needed. We propose a new mode of operation based on CFB which remedies this problem. Our proposal, OCFB, is almost optimally efficient (i.e., almost as many message bits are encrypted as block-cipher output bits produced) and it can self-synchronize after the loss or insertion of transmission units. We prove the security of CFB and OCFB in the sense of modern cryptography.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Bellare, A. Desai, E. Jokipii, P. Rogaway: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation, 38th Symposium on Foundations of Computer Science (FOCS), IEEE Computer Society, 1997, 394–403.
M. Bellare, R. Guérin, P. Rogaway: XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions; Crypto’ 95, LNCS 963, Springer-Verlag, Berlin 1995, 15–28.
E. Biham: On Modes of Operation; Fast Software Encryption’ 93, LNCS 809, Springer-Verlag, Berlin 1994, 116–120.
E. Biham: Cryptanalysis of Multiple Modes of Operation; Journal of Cryptography 11/1 (1998) 45–58.
M. Bellare, J. Kilian, P. Rogaway: The security of cipher block chaining; Crypto’ 94, LNCS 839, Springer-Verlag, Berlin 1994, 341–358.
P. Bocker: ISDN-The Integrated Services Digital Network; (2nd ed.), Springer-Verlag, Berlin 1992.
J. Black, P. Rogaway: CBC macs for arbitrary-length messages: the three-key constructions; Crypto 2000, LNCS 1880, Springer-Verlag, Berlin 2000, 197–215.
D. Coppersmith, L. R. Knudsen, C. J. Mitchell: Key recovery and forgery attacks on the MacDES MAC algorithm; Crypto 2000, LNCS 1880, Springer-Verlag, Berlin 2000, 184–196.
Specification for the Data Encryption Standard; Federal Information Processing Standards Publication 46 (FIPS PUB 46), 1977.
W. Diffie, M. E. Hellman: Privacy and Authentication: An Introduction to Cryptography; Proceedings of the IEEE 67/3 (1979) 397–427.
J. Daemen, V. Rijmen: The Rijndael Block Cipher, AES Proposal; http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf, 1999.
DES Modes of Operation; Federal Information Processing Standards Publication 81 (FIPS PUB 81) December 2, 1980.
V. Gligor, P. Donescu: Integrity-Aware PCBC Encryption Schemes; Security Protocols 1999, LNCS 1796, Springer-Verlag, Berlin 2000, 153–171.
O. Goldreich, S. Goldwasser, S. Micali: How to construct random functions. Journal of the ACM 33/4 (1986) 210–217.
H. Handschuh, B. Preneel: On the Security of Double and 2-Key Triple Modes of Operation; 6th International Workshop on Fast Software Encryption, LNCS 1636, Springer-Verlag, Berlin 1999, 215–230.
C. S. Jutla: Encryption Modes with Almost Free Message Integrity; NIST Workshop Symmetric Key Block Cipher Modes of Operation, Baltimore, October 2000, http://csrc.nist.gov/encryption/aes/modes/.
X. Lai, J. Massey: A Proposal for a New Block Encryption Standard; Eurocrypt’ 90, LNCS 473, Springer-Verlag, Berlin 1991, 389–404.
H. Lipmaa, P. Rogaway, D. Wagner: CTR-Mode Encryption; NIST Workshop Symmetric Key Block Cipher Modes of Operation, Baltimore, October 2000, http://csrc.nist.gov/encryption/aes/modes/.
Randolph Nelson: Probability, Stochastic Processes, and Queuing Theory, Springer 95
National Institute of Standards (NIST): AES—Advanced Encryption Standard (AES) Development Effort; http://csrc.nist.gov/encryption/aes/, 1997–2000.
B. Preneel, M. Nuttin, V. Rijmen, J. Buelens: Cryptanalysis of DES in the CFB mode; Crypto’ 93, LNCS 773, Springer-Verlag, Berlin 1994, 212–223.
E. Petrank, C. Rackoff: CBC MAC for Real-Time Data Sources; Journal of Cryptology 13/3 (2000) 315–338.
P. Rogaway: OCB Mode: Parallelizable Authenticated Encryption; NIST Workshop Symmetric Key Block Cipher Modes of Operation, Baltimore, October 2000, http://csrc.nist.gov/encryption/aes/modes/.
D. Wagner: Cryptanalysis of some Recently-Proposed Multiple Modes of Operation; Fast Software Encryption’ 98, LNCS 1372, Springer-Verlag, Berlin 1998, 254–269.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alkassar, A., Geraldy, A., Pfitzmann, B., Sadeghi, AR. (2002). Optimized Self-Synchronizing Mode of Operation. In: Matsui, M. (eds) Fast Software Encryption. FSE 2001. Lecture Notes in Computer Science, vol 2355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45473-X_7
Download citation
DOI: https://doi.org/10.1007/3-540-45473-X_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43869-4
Online ISBN: 978-3-540-45473-1
eBook Packages: Springer Book Archive