增强计数器模式

M. A. Tarhuni, S. H. Ng, Azman Samsudin, W. P. Ng
{"title":"增强计数器模式","authors":"M. A. Tarhuni, S. H. Ng, Azman Samsudin, W. P. Ng","doi":"10.1109/APCC.2003.1274448","DOIUrl":null,"url":null,"abstract":"There are plenty of modes of operation for block ciphers available. All of them are developed as ciphers' extension or enhancement tool to gain better security or additional features. NITS had defined 5 modes as the standards; they are ECB, CBC, CFB, OFB and CTR mode. Among these modes, the CTR mode is the one that capable to be fully parallelized and possess more security features. However the disadvantage in the implementation of CTR mode is the deviation of the counter value between the encryptor and decryptor. The synchronization of the counter value can be easily lost during delivery or transmission, hence affecting the integrity of the system. This paper proposed a method to eliminate the synchronization issue by calculating the initial counter value from the initial value. The new counter value is calculated using an algorithm comprises of the cipher algorithm and a hash algorithm. This new method introduce minimum overhead at the beginning of each encryption or decryption process. By using the enhanced version of CTR mode, the implementation has become simplified, while maintaining its attractive features of better security and its ability of parallel processing.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Enhanced counter mode\",\"authors\":\"M. A. Tarhuni, S. H. Ng, Azman Samsudin, W. P. Ng\",\"doi\":\"10.1109/APCC.2003.1274448\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are plenty of modes of operation for block ciphers available. All of them are developed as ciphers' extension or enhancement tool to gain better security or additional features. NITS had defined 5 modes as the standards; they are ECB, CBC, CFB, OFB and CTR mode. Among these modes, the CTR mode is the one that capable to be fully parallelized and possess more security features. However the disadvantage in the implementation of CTR mode is the deviation of the counter value between the encryptor and decryptor. The synchronization of the counter value can be easily lost during delivery or transmission, hence affecting the integrity of the system. This paper proposed a method to eliminate the synchronization issue by calculating the initial counter value from the initial value. The new counter value is calculated using an algorithm comprises of the cipher algorithm and a hash algorithm. This new method introduce minimum overhead at the beginning of each encryption or decryption process. By using the enhanced version of CTR mode, the implementation has become simplified, while maintaining its attractive features of better security and its ability of parallel processing.\",\"PeriodicalId\":277507,\"journal\":{\"name\":\"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APCC.2003.1274448\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCC.2003.1274448","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

分组密码有很多可用的操作模式。它们都是作为密码的扩展或增强工具而开发的,以获得更好的安全性或附加功能。NITS确定了5种模式作为标准;它们是ECB, CBC, CFB, OFB和CTR模式。在这些模式中,CTR模式是一种能够完全并行化并且具有更多安全特性的模式。然而,CTR模式实现的缺点是加密和解密之间的计数器值存在偏差。计数器值的同步性在传送过程中容易丢失,从而影响系统的完整性。本文提出了一种从初始值计算初始计数器值来消除同步问题的方法。新计数器值的计算采用由密码算法和散列算法组成的算法。这种新方法在每个加密或解密过程开始时引入了最小的开销。通过使用增强版的CTR模式,简化了实现,同时保持了其具有更好的安全性和并行处理能力等吸引人的特性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Enhanced counter mode
There are plenty of modes of operation for block ciphers available. All of them are developed as ciphers' extension or enhancement tool to gain better security or additional features. NITS had defined 5 modes as the standards; they are ECB, CBC, CFB, OFB and CTR mode. Among these modes, the CTR mode is the one that capable to be fully parallelized and possess more security features. However the disadvantage in the implementation of CTR mode is the deviation of the counter value between the encryptor and decryptor. The synchronization of the counter value can be easily lost during delivery or transmission, hence affecting the integrity of the system. This paper proposed a method to eliminate the synchronization issue by calculating the initial counter value from the initial value. The new counter value is calculated using an algorithm comprises of the cipher algorithm and a hash algorithm. This new method introduce minimum overhead at the beginning of each encryption or decryption process. By using the enhanced version of CTR mode, the implementation has become simplified, while maintaining its attractive features of better security and its ability of parallel processing.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Effectiveness of information systems security in IT organizations in Malaysia Minimization of the PAPR of OFDM by linear systematic block coding Analysis of fiber Bragg gratings apodized with linearly approximated segmented Gaussian function Design and implementation of autonomous distributed secret sharing storage system Low power design of block FIR filtering for high throughput rate applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1