Skip to main content
Log in

An efficient format-preserving encryption mode for practical domains

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Format-preserving encryption (FPE), which makes sure that ciphertext has the same format as plaintext, has been widely used in protecting sensitive data in a database. Aiming at efficiently solving the FPE problem on a collection of practical domains, we propose the RREM (random reference-based encryption mode), which constructs bijection between the original domain and integer set through distance computation. If an appropriate distance function is predefined, the proposed mode can solve the FPE problem on linear equidistance domain in a more efficient way than previous methods. Furthermore, we make a classification on various types of domains, show the application of RREM in some practical domains, and specify RREM’s capability of solving the FPE problem on frequently-used fields in database quite efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Spies T. Format preserving encryption [EB/OL]. [2012-01-13]. http://157.238.212.45/pdf/Voltage-Security-WhitePaper-Format-Preserving-Encryption.pdf .

  2. Spies T. Feistel finite set encryption mode [EB/OL]. [2012-01-13]. http://csrc.nist.gov/groups/ST/toolkit/BCM/docments/proposedmodes/ffsem/ffsem-spec .

  3. FIPS Pub 74. Guidelines for Implementing and Using the NBS Data Encryption Standard [S]. USA: U.S. National Bureau, 1981.

    Google Scholar 

  4. Brightwell M, Smith H E. Using datatype-preserving encryption to enhance data warehouse security [C]// Proceeding of National Information Systems Security Conference. Baltimore: National Institute of Standards and Technology, 1997: 141–149.

    Google Scholar 

  5. Black J, Rogaway P. Ciphers with arbitrary finite domains [C]//Proceeding of Topics in Cryptology CT-RSA 2002. San Jose: Springer-Verlag, 2002: 185–203.

    Google Scholar 

  6. Bellare M, Ristenpart T, Rogaway P, et al. Format preserving encryption [C]// Proceeding of the Selected Areas in Cryptography 2009. Calgary: Springer-Verlag, 2009: 295–312.

    Chapter  Google Scholar 

  7. Liskov M, Rivest R L, Wagner D. Tweakable block ciphers [C]//Proceeding of Advances in Cryptology CRYPTO 2002. Santa Barbara: Springer-Verlag, 2002: 31–46.

    Google Scholar 

  8. Schneier B, Kelsey J. Unbalanced feistel networks and block cipher design [C]//Proceeding of Fast Software Encryption 1996. Cambridge: Springer-Verlag, 1996: 121–144.

    Chapter  Google Scholar 

  9. Bellare M, Rogaway P, Spies T. The FFX mode of operation for format-preserving encryption [EB/OL]. [2012-07-14]. http://www.csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffx/ffx-spec.pdf .

  10. Bellare M, Rogaway P, Spies T. Addendum to the ‘The FFX mode of operation for format-preserving encryption’ [EB/OL]. [2012-01-13]. http://csrc.ncsl.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffx/ffx-spec2.pdf .

  11. Brier E, Peyrin T, Stern J. BPS: A format-preserving encryption proposal [EB/OL]. [2012-01-13]. http://brutus.ncsl.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/bps/bps-spec.pdf .

  12. Liu Z, Jia C, Li J, et al. Format-preserving encryption for datetime[C]// Proceedings 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems. Xiamen: IEEE Press, 2010: 201–205.

    Google Scholar 

  13. Bubley R, Dyer M, Greenhill C, et al. On Approximately counting colorings of small degree graphs [J]. SIAM Journal on Computing, 2000, 29(2): 387–400.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheli Liu.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60973141), the Specialized Research Fund for the Doctoral Program of Higher Education of China (20100031110030), the Funds of Key Lab of Fujian Province University Network Security and Cryptology (2011004), and the Fundamental Research Funds for the Central Universities

Biography: LI Jingwei, male, Ph. D. candidate, research direction: information security, applied cryptography, etc.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, J., Liu, Z., Xu, L. et al. An efficient format-preserving encryption mode for practical domains. Wuhan Univ. J. Nat. Sci. 17, 428–434 (2012). https://doi.org/10.1007/s11859-012-0865-9

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-012-0865-9

Key words

CLC number

Navigation