Fast Encryption and Authentication in One Shot
Virgil Gligor - University of Maryland
Oct 25, 2000
AbstractA long-standing goal in the design of block encryption modes has been the ability to provide message-integrity protection with simple manipulation detection code functions, such as bitwise exclusive-or, cyclic redundancy code, or even constant functions. Most attempts to achieve this goal focused on different variations of the Cipher Block Chaining mode of encryption, which is the most common block-encryption mode in use. To date, most attempts -- including one of my own -- failed. In this seminar, I will present several modes that achieve both confidentiality and integrity (authenticity) in a single pass over the data and a single cryptographic primitive, in both sequential and parallel operation. Fast two-pass modes are also supported whenever the separation of confidentiality and integrity keys is desired. The performance and security of the modes presented scales directly with the performance and security of the underlying block-encryption function since separate cryptographic primitives, such as hash functions, become unnecessary. I anticipate that new encryption modes, such as the ones presented, will be used to save power, chip real-estate in hardware implementations, and to improve encryption throughput for new internet applications.
About the SpeakerVirgil D. Gligor\'s research interests have been in the areas of network and distributed system security (e.g., access control models, denial-of-service protection, penetration analysis methods and tools), and cryptographic modes, protocols and infrastructures (e.g., analysis of symmetric encryption modes, and authentication protocols). He received his B.Sc., M.Sc., and Ph.D. degrees in EECS from the University of California at Berkeley in 1972, 1973, and 1976, respectively. He was a consultant to Burroughs (1977 - 1981) and IBM (1984 - 1998) Corporations. He joined the faculty of the University of Maryland in 1976, where he is a Professor of Electrical and Computer Engineering.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.