Abstract
This chapter introduces basic cryptographic mechanisms that serve as foundational building blocks for computer security: symmetric-key and public-key encryption, public-key digital signatures, hash functions, and message authentication codes. Other mathematical and crypto background is deferred to specific chapters as warranted by context.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In ASIACRYPT, pages 531-545, 2000. Revised in: J. Crypt., 2008.
D. J. Bernstein. ChaCha, a variant of Salsa20. 28 Jan 2008 manuscript; see also https://cr.yp.to/chacha.html.
D. J. Bernstein. The Poly1305-AES Message-Authentication Code. In Fast Software Encryption, pages 32-49, 2005. See also https://cr.yp.to/mac.html.
J. Black. Authenticated encryption. In Encyclopedia of Cryptography and Security. Springer (editor: Henk C.A. van Tilborg), 2005. Manuscript also online, dated 12 Nov 2003.
D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of AMS, 46(2):203-213, 1999.
D. Boneh, A. Joux, and P. Q. Nguyen. Why textbook ElGamal and RSA encryption are insecure. In ASIACRYPT, pages 30-43, 2000.
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Info. Theory, 22(6):644- 654, 1976.
W. Diffie and M. E. Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397-427, March 1979.
N. Ferguson and B. Schneier. Practical Cryptography. Wiley, 2003.
D. Hankerson, A. Menezes, and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer, 2004.
IEEE Computer Society. IEEE Std 1619-2007: Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices. 18 April 2008. Defines the XTS-AES encryption mode.
J. Jonsson. On the security of CTR + CBC-MAC. In Workshop on Selected Areas in Cryptography (SAC), pages 76-93, 2002.
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In ACM Comp. & Comm. Security (CCS), pages 28-36. ACM, 1999.
D. Kahn. The Codebreakers. Macmillan, 1967.
G. H. Kim and E. H. Spafford. The design and implementation of Tripwire: A file system integrity checker. In ACM Comp. & Comm. Security (CCS), pages 18-29. ACM, 1994.
H. Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In CRYPTO, pages 310-331, 2001.
H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104: HMAC: Keyed-Hashing for Message Authenti-cation, Feb. 1997. Informational; updated by RFC 6151 (March 2011).
T. Krovetz and P. Rogaway. The software performance of authenticated-encryption modes. In Fast Software Encryption, pages 306-327, 2011.
D. McGrew. RFC 5116: An Interface and Algorithms for Authenticated Encryption, Jan. 2008. Pro-posed Standard.
D. A. McGrew and J. Viega. The Security and Performance of the Galois/Counter Mode (GCM) of Operation. In INDOCRYPT, pages 343-355, 2004.
A. Menezes. Elliptic Curve Public Key Cryptosystems. Springer, 1993.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996. Openly available, http://cacr.uwaterloo.ca/hac/.
Y. Nir and A. Langley. RFC 7539: ChaCha20 and Poly1305 for IETF Protocols, May 2015. Informa-tional.
NIST. Special Pub 800-38B: Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. May 2005, with updates 6 Oct 2016.
NIST. Special Pub 800-38C: Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004, with updates 20 Jul 2007.
NIST. Special Pub 800-38A: Recommendation for Block Cipher Modes of Operation: Methods and Techniques, Dec. 2001.
NIST. Special Pub 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, Nov. 2007.
NIST. FIPS 198-1: The Keyed-Hash Message Authentication Code (HMAC). U.S. Dept. of Commerce, July 2008.
NIST. FIPS 186-4: Digital Signature Standard. U.S. Dept. of Commerce, July 2013.
NIST. Special Pub 800-57 Part 1 r4: Recommendation for Key Management (Part 1: General). U.S. Dept. of Commerce, Jan 2016. (Revision 4).
NIST. Special Pub 800-67 r2: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. U.S. Dept. of Commerce, Nov 2017. (Revision 2).
A. Popov. RFC 7465: Prohibiting RC4 Cipher Suites, Feb. 2015. Proposed Standard.
B. Preneel. Analysis and Design of Cryptographic Hash Functions. PhD thesis, Katholieke Universiteit Leuven, Belgium, Jan. 1993.
B. Preneel and P. C. van Oorschot. MDx-MAC and Building Fast MACs from Hash Functions. In CRYPTO, pages 1-14, 1995.
B. Preneel and P. C. van Oorschot. On the security of iterated message authentication codes. IEEE Trans. Info. Theory, 45(1):188-199, 1999.
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21(2):120-126, 1978.
P. Rogaway. Authenticated-Encryption with Associated-Data. In ACM Comp. & Comm. Security (CCS), pages 98-107, 2002.
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: a block-cipher mode of operation for efficient authenticated encryption. In ACM Comp. & Comm. Security (CCS), pages 196-205, 2001. Journal version: ACMTISSEC, 2003.
S. Singh. The Code Book. Doubleday, 1999.
S. Turner and L. Chen. RFC 6151: Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms, Mar. 2011. Informational.
P. C. van Oorschot and M. J. Wiener. Parallel collision search with cryptanalytic applications. Journal of Cryptology, 12(1):1-28, 1999.
G. Welchman. The Hut Six Story. M&M Baldwin, 2018. First edition 1982, McGraw-Hill.
D. Whiting, R. Housley, and N. Ferguson. RFC 3610: Counter with CBC-MAC (CCM), Sept. 2003. Informational RFC.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s)
About this chapter
Cite this chapter
van Oorschot, P.C. (2021). Cryptographic Building Blocks. In: Computer Security and the Internet. Information Security and Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-030-83411-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-83411-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-83410-4
Online ISBN: 978-3-030-83411-1
eBook Packages: Computer ScienceComputer Science (R0)