Length-doubling ciphers and tweakable ciphers

Haibin Zhang*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

We motivate and describe a mode of operation HEM (resp., THEM) that turns a n-bit blockcipher into a variable-input-length cipher (resp., tweakable cipher) that acts on strings of [n..2n - 1] bits. Both HEM and THEM are simple and intuitive and use only two blockcipher calls, while prior work at least takes three. We prove them secure in the sense of strong PRP and tweakable strong PRP, assuming the underlying blockcipher is a strong PRP.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 10th International Conference, ACNS 2012, Proceedings
Pages100-116
Number of pages17
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event10th International Conference on Applied Cryptography and Network Security, ACNS 2012 - Singapore, Singapore
Duration: 26 Jun 201229 Jun 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7341 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Applied Cryptography and Network Security, ACNS 2012
Country/TerritorySingapore
CitySingapore
Period26/06/1229/06/12

Keywords

  • ciphers
  • deterministic encryption
  • enciphering scheme
  • symmetric encryption
  • tweakable ciphers
  • universal hash function

Fingerprint

Dive into the research topics of 'Length-doubling ciphers and tweakable ciphers'. Together they form a unique fingerprint.

Cite this