Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2004/141

Elastic AES

Debra L. Cook, Moti Yung, and Angelos D. Keromytis

Abstract

Recently an algorithmic schema was proposed for converting any existing block cipher into one which excepts variable length inputs with the computational workload increasing in proportion to the block size. The resulting cipher is referred to as an elastic block cipher. The initial work presented immunity to certain key recovery attacks, and left open further analysis of the method and its possible instantiations. In order to provide a concrete example of an elastic block cipher, we design and implement an elastic version of the Advanced Encryption Standard (AES) cipher which accepts all block sizes in the range 128 to 255 bits. To validate the design we perform differential cryptanalysis on elastic AES which confirms that the cipher does not introduce potential differential attacks as a result of a subset of bits being omitted from each round (which is at the heart of the elastic design). We also compare the performance of software implementations of elastic AES and regular AES on variable size inputs, as a step in determining the practicality of the elastic version.

Metadata
Available format(s)
PDF PS
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
variable length block ciphersblock cipher design
Contact author(s)
dcook @ cs columbia edu
History
2004-07-06: revised
2004-06-16: received
See all versions
Short URL
https://ia.cr/2004/141
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2004/141,
      author = {Debra L.  Cook and Moti Yung and Angelos D.  Keromytis},
      title = {Elastic {AES}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2004/141},
      year = {2004},
      url = {https://eprint.iacr.org/2004/141}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.