TY - GEN
T1 - Length-doubling ciphers and tweakable ciphers
AU - Zhang, Haibin
PY - 2012
Y1 - 2012
N2 - We motivate and describe a mode of operation HEM (resp., THEM) that turns a n-bit blockcipher into a variable-input-length cipher (resp., tweakable cipher) that acts on strings of [n..2n - 1] bits. Both HEM and THEM are simple and intuitive and use only two blockcipher calls, while prior work at least takes three. We prove them secure in the sense of strong PRP and tweakable strong PRP, assuming the underlying blockcipher is a strong PRP.
AB - We motivate and describe a mode of operation HEM (resp., THEM) that turns a n-bit blockcipher into a variable-input-length cipher (resp., tweakable cipher) that acts on strings of [n..2n - 1] bits. Both HEM and THEM are simple and intuitive and use only two blockcipher calls, while prior work at least takes three. We prove them secure in the sense of strong PRP and tweakable strong PRP, assuming the underlying blockcipher is a strong PRP.
KW - ciphers
KW - deterministic encryption
KW - enciphering scheme
KW - symmetric encryption
KW - tweakable ciphers
KW - universal hash function
UR - http://www.scopus.com/inward/record.url?scp=84863453296&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-31284-7_7
DO - 10.1007/978-3-642-31284-7_7
M3 - Conference contribution
AN - SCOPUS:84863453296
SN - 9783642312830
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 100
EP - 116
BT - Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Proceedings
T2 - 10th International Conference on Applied Cryptography and Network Security, ACNS 2012
Y2 - 26 June 2012 through 29 June 2012
ER -