π-Cipher: Authenticated Encryption for Big Data

作者: Danilo Gligoroski , Hristina Mihajloska , Simona Samardjiska , Håkon Jacobsen , Rune Erlend Jensen

DOI: 10.1007/978-3-319-11599-3_7

关键词: CipherAuthenticated encryptionCryptographyBlock cipher mode of operationCryptographic nonceBlock cipherComputer securityComputer scienceCryptographic primitiveBig data

摘要: In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable incremental is becoming ever more important design goal. π-Cipher parallel, incremental, nonce based authenticated encryption cipher with associated data. It designed the special purpose providing confidentiality integrity for in transit or at rest. has, as an option, a secret part which provides noncemisuse resistance. The involves operations several solid concepts such Encrypt-then-MAC principle, XOR MAC scheme two-pass sponge construction. contains parameters can provide functionality tweakable block ciphers security relies on core permutation function ARX (Addition, Rotation XOR) operations. offers levels ranging from 96 to 256 bits.

参考文章(21)
David A. McGrew, John Viega, The Galois/Counter Mode of Operation (GCM) ,(2005)
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications Selected Areas in Cryptography. pp. 320- 337 ,(2012) , 10.1007/978-3-642-28496-0_19
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
David Wagner, A Generalized Birthday Problem Advances in Cryptology — CRYPTO 2002. pp. 288- 304 ,(2002) , 10.1007/3-540-45708-9_19
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, On the Indifferentiability of the Sponge Construction Advances in Cryptology – EUROCRYPT 2008. pp. 181- 197 ,(2008) , 10.1007/978-3-540-78967-3_11
R. Housley, D. Whiting, N. Ferguson, Counter with CBC-MAC (CCM) RFC. ,vol. 3610, pp. 1- 26 ,(2003)
Charanjit S. Jutla, Encryption Modes with Almost Free Message Integrity Journal of Cryptology. ,vol. 21, pp. 547- 578 ,(2008) , 10.1007/S00145-008-9024-Z
Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz, OCB Proceedings of the 8th ACM conference on Computer and Communications Security - CCS '01. pp. 196- 205 ,(2001) , 10.1145/501983.502011
Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Peter F. Sweeney, Producing wrong data without doing anything obviously wrong! Proceeding of the 14th international conference on Architectural support for programming languages and operating systems - ASPLOS '09. ,vol. 44, pp. 265- 276 ,(2009) , 10.1145/1508244.1508275