Fast Encryption and Authentication in One Shot
Page Content
Virgil Gligor
 |
Oct 25, 2000
RealVideo
Abstract
A long-standing goal in the design of block encryption modes has been the ability to provide message-integrity protection with simple manipulation detection code functions, such as bitwise exclusive-or, cyclic redundancy code, or even constant functions. Most attempts to achieve this goal focused on different variations of the Cipher Block Chaining mode of encryption, which is the most common block-encryption mode in use. To date, most attempts -- including one of my own -- failed. In this seminar, I will present several modes that achieve both confidentiality and integrity (authenticity) in a single pass over the data and a single cryptographic primitive, in both sequential and parallel operation. Fast two-pass modes are also supported whenever the separation of confidentiality and integrity keys is desired. The performance and security of the modes presented scales directly with the performance and security of the underlying block-encryption function since separate cryptographic primitives, such as hash functions, become unnecessary. I anticipate that new encryption modes, such as the ones presented, will be used to save power, chip real-estate in hardware implementations, and to improve encryption throughput for new internet applications.
About the Speaker
Virgil D. Gligor\'s research interests have been in the areas of network and distributed system security (e.g., access control models, denial-of-service protection, penetration analysis methods and tools), and cryptographic modes, protocols and infrastructures (e.g., analysis of symmetric encryption modes, and authentication protocols). He received his B.Sc., M.Sc., and Ph.D. degrees in EECS from the University of California at Berkeley in 1972, 1973, and 1976, respectively. He was a consultant to Burroughs (1977 - 1981) and IBM (1984 - 1998) Corporations. He joined the faculty of the University of Maryland in 1976, where he is a Professor of Electrical and Computer Engineering.
Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M.
STEW G52, West Lafayette Campus.
More information...
© 1999-2013 Purdue University. All rights reserved.
Use/Reuse Guidelines
CERIAS Seminar materials are intended for educational, non-commercial use only and any or all commercial use is prohibited. Any use must attribute "The CERIAS Seminar at Purdue University." Opinions expressed in the recordings are not necessarily representative of the views of CERIAS or of Purdue University.