International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Building Secure Cryptographic Transforms, or How to Encrypt and MAC

Authors:
Tadayoshi Kohno
Adriana Palacio
John Black
Download:
URL: http://eprint.iacr.org/2003/177
Search ePrint
Search Google
Abstract: We describe several notions of ``cryptographic transforms,'' symmetric schemes designed to meet a variety of privacy and authenticity goals. We consider goals, such as replay-avoidance and in-order packet delivery, that have not been fully addressed in previous works in this area. We then provide an analysis of possible ways to combine standard encryption and message authentication schemes in order to provably meet these goals. Our results further narrow the gap between the provable-security results from the theoretical community and the needs of developers who implement real systems.
BibTeX
@misc{eprint-2003-11891,
  title={Building Secure Cryptographic Transforms, or How to Encrypt and MAC},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / Applied cryptography, cryptographic transforms, authenticated encryption, privacy, authenticity, security proofs},
  url={http://eprint.iacr.org/2003/177},
  note={ tkohno@cs.ucsd.edu 12292 received 28 Aug 2003},
  author={Tadayoshi Kohno and Adriana Palacio and John Black},
  year=2003
}