Abstract
All-or-Nothing Encryption is a useful technique which can heighten the security of block ciphers. It can also be used to design faster symmetric-key cryptosystems, by decreasing the number of required encryption operations at run-time. An open problem in the literature regards the speed of all-or-nothing encryption, which we address in this paper by combining two techniques from the literature, forming a new all-or-nothing mode of operation. Trade-offs in the implementation of this design are considered, and theoretical proofs of security are provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bellare, M., Boldyreva, A.: The Security of Chaffing and Winnowing. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 517–530. Springer, Heidelberg (2000)
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: FOCS 1997, 38th Annual Symposium on Foundations of Computer Science, pp. 394–403. IEEE Computer Society Press, Los Alamitos (1997)
Berman, V.: Enhancing Data Security in Mobile Ad Hoc Networks via Multipath Routing and Directional Transmission. Master’s thesis, University of California, Davis (2005)
Boyko, V.: On All-or-Nothing Transforms and Password-Authenticated Key Exchange Protocols. PhD thesis, Massachusetts Institute of Technology (2000)
Byers, J., Considine, J., Itkis, G., Cheng, M.C., Yeung, A.: Securing bulk content almost for free. Journal of Computer Communications, Special Issue on Internet Security 29, 290–290 (2006)
Desai, A.: The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 359–375. Springer, Heidelberg (2000), http://www.cs.ucsd.edu/users/adesai/
Dodis, Y.: Exposure-Resilient Cryptography. PhD thesis, Massachusetts Institute of Technology (2000)
Dodis, Y., Sahai, A., Smith, A.: On Perfect and Adaptive Security in Exposure-Resilient Cryptography. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 301–324. Springer, Heidelberg (2001)
ECRYPT (2006). ECRYPT Yearly Report on Algorithms and Keysizes (2005), http://www.ecrypt.eu.org
Johnson, D., Matyas, S., Peyravian, M.: Encryption of Long Blocks Using a Short-Block Encryption Procedure. In: Submitted for inclusion in the IEEE P1363a standard (1996)
Kiong, N.C., Samsudin, A.: Incoercible Secure Electronic Voting Scheme Based on Chaffing and Winnowing. In: APCC 2003, The 9th Asia-Pacific Conference on Communications, vol. 2, pp. 838–843. IEEE, Los Alamitos (2003)
Lipmaa, H., Rogaway, P., Wagner, D.: CTR-Mode Encryption. Comments to NIST concerning AES Modes of Operation (2000)
Marnas, S.I., Angelis, L., Bleris, G.L.: All-Or-Nothing Transforms Using Quasigroups. In: Proc. of 1st Balkan Conference on Informatics, pp. 183–191 (2003)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996), http://www.cacr.math.uwaterloo.ca/hac/
Peterson, Z.N.J., Burns, R.C., Herring, J., Stubblefield, A., Rubin, A.D.: Secure Deletion for a Versioning File System. In: FAST 2005, pp. 143–154. USENIX (2005)
Rivest, R.L.: All-or-Nothing Encryption and the Package Transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997)
Shannon, C.E.: Communication theory of secrecy systems. Bell Systems Technical Journal 28(4), 656–715 (1949)
Zhang, R., Hanaoka, G., Imai, H.: On the Security of Cryptosystems with All-or-Nothing Transform. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 76–90. Springer, Heidelberg (2004)
Zhang, R., Hanaoka, G., Shikata, J., Imai, H.: On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 360–374. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
McEvoy, R.P., Murphy, C.C. (2008). Efficient All-or-Nothing Encryption Using CTR Mode. In: Filipe, J., Obaidat, M.S. (eds) E-Business and Telecommunication Networks. ICETE 2006. Communications in Computer and Information Science, vol 9. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70760-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-70760-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-70759-2
Online ISBN: 978-3-540-70760-8
eBook Packages: Computer ScienceComputer Science (R0)