Skip to main content
  • 1493 Accesses

Abstract

This paper focuses on the length-preserving symmetric cryptography, with which people can encrypt messages of variable length (especially arbitrary length) to get ciphertext of length identical to that of plaintext being encrypted. Two confidentiality modes being able to achieve length-preserving encryption, i.e., OFB mode and CTR mode, are analyzed in terms of obstacles to guaranteeing message privacy. Furthermore, a new mode of operation, CBC-LP, is proposed for both achieving length-preserving encryption and exploiting advantages of implementing CBC mode over other confidentiality modes, such as OFB, CTR modes and so on.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Netscape, SSL 3.0 specification, http://wp.netscape.com/eng/ssl3/

    Google Scholar 

  2. IETF, IP Security, RFC 2401-2412, http://www.ietf.org/rfc

    Google Scholar 

  3. RFC 2865, Remote Authentication Dial In User Service (RADIUS). June 2000. Available at: http://www.ietf.org/rfc/rfc2865.txt

    Google Scholar 

  4. WS-Security: SOAP Message Security 1.0 (WS-Security 1.0), March 2004. Available at: http://docs.oasisopen.org/wss/2004/01/

    Google Scholar 

  5. FIPS Publication 46-3. Data Encryption Standard (DES). U.S. Doc/NIST, October 25, 1999.

    Google Scholar 

  6. FIPS Publication 197. Advanced Encryption Standard (AES). U.S. Doc/NIST, November 26, 2001.

    Google Scholar 

  7. Oded Goldreich, Foundations of Cryptography – Basic Tools, Cambridge University Press, 2001, P.39.

    Google Scholar 

  8. ISO/IEC 7816, Identification Cards-Integrated circuit(s) cards with contacts, International Organization for Standardization.

    Google Scholar 

  9. NIST Special Publication 800-38A. Recommendation for Block Cipher Modes of Operation: Methods and Techniques. U.S. Doc/NIST, December, 2001.

    Google Scholar 

  10. XML Encryption Syntax and Processing, December 2002. http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/

    Google Scholar 

  11. RFC 2409. The Internet Key Exchange (IKE). November 1998.

    Google Scholar 

  12. RFC 2408. Internet Security Association and Key Management Protocol (ISAKMP). November 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer

About this paper

Cite this paper

Jianwu, Z., Hui, L., Mingsheng, L. (2007). On Length-Preserving Symmetric Cryptography. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M. (eds) Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6266-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-6266-7_35

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-6265-0

  • Online ISBN: 978-1-4020-6266-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics