Skip to main content

Efficient All-or-Nothing Encryption Using CTR Mode

  • Conference paper
Book cover E-Business and Telecommunication Networks (ICETE 2006)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 9))

Included in the following conference series:

  • 538 Accesses

Abstract

All-or-Nothing Encryption is a useful technique which can heighten the security of block ciphers. It can also be used to design faster symmetric-key cryptosystems, by decreasing the number of required encryption operations at run-time. An open problem in the literature regards the speed of all-or-nothing encryption, which we address in this paper by combining two techniques from the literature, forming a new all-or-nothing mode of operation. Trade-offs in the implementation of this design are considered, and theoretical proofs of security are provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Boldyreva, A.: The Security of Chaffing and Winnowing. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 517–530. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: FOCS 1997, 38th Annual Symposium on Foundations of Computer Science, pp. 394–403. IEEE Computer Society Press, Los Alamitos (1997)

    Chapter  Google Scholar 

  3. Berman, V.: Enhancing Data Security in Mobile Ad Hoc Networks via Multipath Routing and Directional Transmission. Master’s thesis, University of California, Davis (2005)

    Google Scholar 

  4. Boyko, V.: On All-or-Nothing Transforms and Password-Authenticated Key Exchange Protocols. PhD thesis, Massachusetts Institute of Technology (2000)

    Google Scholar 

  5. Byers, J., Considine, J., Itkis, G., Cheng, M.C., Yeung, A.: Securing bulk content almost for free. Journal of Computer Communications, Special Issue on Internet Security 29, 290–290 (2006)

    Google Scholar 

  6. Desai, A.: The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 359–375. Springer, Heidelberg (2000), http://www.cs.ucsd.edu/users/adesai/

    Chapter  Google Scholar 

  7. Dodis, Y.: Exposure-Resilient Cryptography. PhD thesis, Massachusetts Institute of Technology (2000)

    Google Scholar 

  8. Dodis, Y., Sahai, A., Smith, A.: On Perfect and Adaptive Security in Exposure-Resilient Cryptography. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 301–324. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. ECRYPT (2006). ECRYPT Yearly Report on Algorithms and Keysizes (2005), http://www.ecrypt.eu.org

  10. Johnson, D., Matyas, S., Peyravian, M.: Encryption of Long Blocks Using a Short-Block Encryption Procedure. In: Submitted for inclusion in the IEEE P1363a standard (1996)

    Google Scholar 

  11. Kiong, N.C., Samsudin, A.: Incoercible Secure Electronic Voting Scheme Based on Chaffing and Winnowing. In: APCC 2003, The 9th Asia-Pacific Conference on Communications, vol. 2, pp. 838–843. IEEE, Los Alamitos (2003)

    Chapter  Google Scholar 

  12. Lipmaa, H., Rogaway, P., Wagner, D.: CTR-Mode Encryption. Comments to NIST concerning AES Modes of Operation (2000)

    Google Scholar 

  13. Marnas, S.I., Angelis, L., Bleris, G.L.: All-Or-Nothing Transforms Using Quasigroups. In: Proc. of 1st Balkan Conference on Informatics, pp. 183–191 (2003)

    Google Scholar 

  14. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996), http://www.cacr.math.uwaterloo.ca/hac/

    Google Scholar 

  15. Peterson, Z.N.J., Burns, R.C., Herring, J., Stubblefield, A., Rubin, A.D.: Secure Deletion for a Versioning File System. In: FAST 2005, pp. 143–154. USENIX (2005)

    Google Scholar 

  16. Rivest, R.L.: All-or-Nothing Encryption and the Package Transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  17. Shannon, C.E.: Communication theory of secrecy systems. Bell Systems Technical Journal 28(4), 656–715 (1949)

    MathSciNet  Google Scholar 

  18. Zhang, R., Hanaoka, G., Imai, H.: On the Security of Cryptosystems with All-or-Nothing Transform. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 76–90. Springer, Heidelberg (2004)

    Google Scholar 

  19. Zhang, R., Hanaoka, G., Shikata, J., Imai, H.: On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 360–374. Springer, Heidelberg (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Joaquim Filipe Mohammad S. Obaidat

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

McEvoy, R.P., Murphy, C.C. (2008). Efficient All-or-Nothing Encryption Using CTR Mode. In: Filipe, J., Obaidat, M.S. (eds) E-Business and Telecommunication Networks. ICETE 2006. Communications in Computer and Information Science, vol 9. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70760-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-70760-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-70759-2

  • Online ISBN: 978-3-540-70760-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics