Abstract
This document presents EPBC, Efficient Error-Propagating Block Chaining, a new and efficient block encryption mode using both plaintext and ciphertext feedback. This encryption mode is similar to another one, IOBC, and was likewise designed to propagate erroneous decryptions of tampered blocks of ciphered data to all following blocks, hence allowing to validate the integrity of that data using a predefined trailing value. However, EPBC is more secure than IOBC, as it is not vulnerable to any known-plaintext attacks, and is more efficient than IOBC. Performance tests ran on a SPARCstation 10/40 show that EPBC is in average 1.2 times faster than IOBC, and 6.3 to 10.9 times faster than a common combination of an encryption mode and a one-way hash function (CBC and MD5).
Preview
Unable to display preview. Download preview PDF.
References
Ashar Aziz, Tom Markson, and Hemma Prafullchandra. Simple Key-Management For Internet Protocols (SKIP). Internet Draft, Sun Microsystems, Inc., December 1995.
D. Balenson. Privacy Enhancement for Internet Electronic Mail (Part III): Algorithms, Modes, and Identifiers. RFC 1423, IAB IRTF PSRG, IETF PEM WG, February 1993.
Alan O. Freier, Philip Karlton, and Paul C. Kocher. SSL Protocol Version 3.0. Internet Draft, Netscape Communications Corp., March 1996.
Information Processing — Modes of Operation for an n-bit Block Cipher Algorithm. ISO IEC/DIS 10116, 1989.
J. T. Kohl. The Use of Encryption in Kerberos for Network Authentication. In Advances in Cryptology — CRYPTO '89 Proceedings, pages 35–43. Springer-Verlag, 1990.
C. H. Meyer and S. M. Matyas. Cryptography: A New Dimension in Computer Data Security. John Wiley & Sons, Inc., New York, 1982.
Xerox Network System (XNS) Authentication Protocol. XSIS 098404, Xerox Corporation, April 1984.
Francisco Recacha. IOBC: Un nuevo modo de encadenamiento para cifrado en bloque. In Proc. of the IV Reunion Espanyola sobre Criptologia, Valladolid, September 1996.
R. Rivest. The MD5 Message-Digest Algorithm. RFC 1321, MIT Laboratory for Computer Science and RSA Data Security, Inc., April 1992.
Bruce Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons, Inc., second edition, 1996.
Secure Hash Standard. NIST FIPS PUB 180, April 1993.
Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An Authentication Service for Open Network Systems. In Proc. of the USENIX Winter Conf., pages 191–202, Dallas, Texas, USA, February 1988.
Philip Zimmermann. The Official PGP User's Guide. MIT Press, 1995.
André Zûquete and Paulo Guedes. Transparent Authentication and Confidentiality for Stream Sockets. IEEE Micro, 16(3):34–41, June 1996.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Znquete, A., Guedes, P. (1997). Efficient error-propagating block chaining. In: Darnell, M. (eds) Crytography and Coding. Cryptography and Coding 1997. Lecture Notes in Computer Science, vol 1355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0024478
Download citation
DOI: https://doi.org/10.1007/BFb0024478
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63927-5
Online ISBN: 978-3-540-69668-1
eBook Packages: Springer Book Archive