Abstract
We motivate and describe a mode of operation HEM (resp., THEM) that turns a n-bit blockcipher into a variable-input-length cipher (resp., tweakable cipher) that acts on strings of [n..2nāāā1] bits. Both HEM and THEM are simple and intuitive and use only two blockcipher calls, while prior work at least takes three. We prove them secure in the sense of strong PRP and tweakable strong PRP, assuming the underlying blockcipher is a strong PRP.
Chapter PDF
Similar content being viewed by others
Keywords
References
Bellare, M., Rogaway, P.: On the Construction of Variable-Input-Length Ciphers. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.Ā 1636, pp. 231ā244. Springer, Heidelberg (1999)
Bellare, M., Rogaway, P.: The Security of Triple Encryption and a FrameworkĀ forĀ Code-BasedĀ Game-PlayingĀ Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.Ā 4004, pp. 409ā426. Springer, Heidelberg (2006)
Chakraborty, D., Sarkar, P.: HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.Ā 4329, pp. 287ā302. Springer, Heidelberg (2006)
Chakraborty, D., Sarkar, P.: A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.Ā 4047, pp. 293ā309. Springer, Heidelberg (2006)
Cook, D., Yung, M., Keromytis, A.: Elastic block ciphers: method, security and instantiations. Int. J. Inf. Sec.Ā 8(3), 211ā231 (2009)
McGrew, D.A., Fluhrer, S.R.: The Security of the Extended Codebook (XCB) Mode of Operation. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.Ā 4876, pp. 311ā327. Springer, Heidelberg (2007)
Goldenberg, D., Hohenberger, S., Liskov, M., Schwartz, E.C., Seyalioglu, H.: On Tweaking Luby-Rackoff Blockciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.Ā 4833, pp. 342ā356. Springer, Heidelberg (2007)
Gueron, S.: Intelās New AES Instructions for Enhanced Performance and Security. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.Ā 5665, pp. 51ā66. Springer, Heidelberg (2009)
Halevi, S.: An observation regarding Jutlaās modes of operation. Cryptology ePrint report 2001/015 (April 2, 2001)
Halevi, S.: EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.Ā 3348, pp. 315ā327. Springer, Heidelberg (2004)
Halevi, S.: Invertible Universal Hashing and the TET Encryption Mode. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.Ā 4622, pp. 412ā429. Springer, Heidelberg (2007)
Halevi, S., Rogaway, P.: A Parallelizable Enciphering Mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.Ā 2964, pp. 292ā304. Springer, Heidelberg (2004)
Halevi, S., Rogaway, P.: A Tweakable Enciphering Mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.Ā 2729, pp. 482ā499. Springer, Heidelberg (2003)
Krawczyk, H.: LFSR-Based Hashing and Authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.Ā 839, pp. 129ā139. Springer, Heidelberg (1994)
Krovetz, T., Rogaway, P.: The Software Performance of Authenticated-Encryption Modes. In: Joux, A. (ed.) FSE 2011. LNCS, vol.Ā 6733, pp. 306ā327. Springer, Heidelberg (2011)
Liskov, M., Minematsu, K.: Comments on XTS-AES (September 2008), http://csrc.nist.gov/
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of ComputingĀ 17(2), 373ā386 (1988)
Liskov, M., Rivest, R.L., Wagner, D.: Tweakable Block Ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.Ā 2442, pp. 31ā46. Springer, Heidelberg (2002)
Meyer, C., Matyas, M.: Cryptography: A new dimension in data security. John Wiley & Sons, New York (1982)
Naor, M., Reingold, O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. Journal of CryptologyĀ 12(1), 29ā66 (1999)
IEEE PĀ 1619. IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices
Patel, S., Ramzan, Z., Sundaram, G.S.: Efficient Constructions of Variable-Input-Length Block Ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.Ā 3357, pp. 326ā340. Springer, Heidelberg (2004)
Ristenpart, T., Rogaway, P.: How to Enrich the Message Space of a Cipher. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.Ā 4593, pp. 101ā118. Springer, Heidelberg (2007)
Rogaway, P., Zhang, H.: Online Ciphers from Tweakable Blockciphers. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol.Ā 6558, pp. 237ā249. Springer, Heidelberg (2011)
Rogaway, P., Wooding, M., Zhang, H.: The security of ciphertext stealing. In: FSEĀ 2012. LNCS. Springer (2012)
Schneier, B., Kelsey, J.: Unbalanced Feistel Networks and Block Cipher Design. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.Ā 1039, pp. 121ā144. Springer, Heidelberg (1996)
Wang, P., Feng, D., Wu, W.: HCTR: A Variable-Input-Length Enciphering Mode. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol.Ā 3822, pp. 175ā188. Springer, Heidelberg (2005)
Zheng, Y., Matsumoto, T., Imai, H.: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.Ā 435, pp. 461ā480. Springer, Heidelberg (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, H. (2012). Length-Doubling Ciphers and Tweakable Ciphers. In: Bao, F., Samarati, P., Zhou, J. (eds) Applied Cryptography and Network Security. ACNS 2012. Lecture Notes in Computer Science, vol 7341. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31284-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-31284-7_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31283-0
Online ISBN: 978-3-642-31284-7
eBook Packages: Computer ScienceComputer Science (R0)