Skip to main content

Efficient error-propagating block chaining

  • Conference paper
  • First Online:
Book cover Crytography and Coding (Cryptography and Coding 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1355))

Included in the following conference series:

Abstract

This document presents EPBC, Efficient Error-Propagating Block Chaining, a new and efficient block encryption mode using both plaintext and ciphertext feedback. This encryption mode is similar to another one, IOBC, and was likewise designed to propagate erroneous decryptions of tampered blocks of ciphered data to all following blocks, hence allowing to validate the integrity of that data using a predefined trailing value. However, EPBC is more secure than IOBC, as it is not vulnerable to any known-plaintext attacks, and is more efficient than IOBC. Performance tests ran on a SPARCstation 10/40 show that EPBC is in average 1.2 times faster than IOBC, and 6.3 to 10.9 times faster than a common combination of an encryption mode and a one-way hash function (CBC and MD5).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashar Aziz, Tom Markson, and Hemma Prafullchandra. Simple Key-Management For Internet Protocols (SKIP). Internet Draft, Sun Microsystems, Inc., December 1995.

    Google Scholar 

  2. D. Balenson. Privacy Enhancement for Internet Electronic Mail (Part III): Algorithms, Modes, and Identifiers. RFC 1423, IAB IRTF PSRG, IETF PEM WG, February 1993.

    Google Scholar 

  3. Alan O. Freier, Philip Karlton, and Paul C. Kocher. SSL Protocol Version 3.0. Internet Draft, Netscape Communications Corp., March 1996.

    Google Scholar 

  4. Information Processing — Modes of Operation for an n-bit Block Cipher Algorithm. ISO IEC/DIS 10116, 1989.

    Google Scholar 

  5. J. T. Kohl. The Use of Encryption in Kerberos for Network Authentication. In Advances in Cryptology — CRYPTO '89 Proceedings, pages 35–43. Springer-Verlag, 1990.

    Google Scholar 

  6. C. H. Meyer and S. M. Matyas. Cryptography: A New Dimension in Computer Data Security. John Wiley & Sons, Inc., New York, 1982.

    Google Scholar 

  7. Xerox Network System (XNS) Authentication Protocol. XSIS 098404, Xerox Corporation, April 1984.

    Google Scholar 

  8. Francisco Recacha. IOBC: Un nuevo modo de encadenamiento para cifrado en bloque. In Proc. of the IV Reunion Espanyola sobre Criptologia, Valladolid, September 1996.

    Google Scholar 

  9. R. Rivest. The MD5 Message-Digest Algorithm. RFC 1321, MIT Laboratory for Computer Science and RSA Data Security, Inc., April 1992.

    Google Scholar 

  10. Bruce Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons, Inc., second edition, 1996.

    Google Scholar 

  11. Secure Hash Standard. NIST FIPS PUB 180, April 1993.

    Google Scholar 

  12. Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An Authentication Service for Open Network Systems. In Proc. of the USENIX Winter Conf., pages 191–202, Dallas, Texas, USA, February 1988.

    Google Scholar 

  13. Philip Zimmermann. The Official PGP User's Guide. MIT Press, 1995.

    Google Scholar 

  14. André Zûquete and Paulo Guedes. Transparent Authentication and Confidentiality for Stream Sockets. IEEE Micro, 16(3):34–41, June 1996.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Michael Darnell

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Znquete, A., Guedes, P. (1997). Efficient error-propagating block chaining. In: Darnell, M. (eds) Crytography and Coding. Cryptography and Coding 1997. Lecture Notes in Computer Science, vol 1355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0024478

Download citation

  • DOI: https://doi.org/10.1007/BFb0024478

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63927-5

  • Online ISBN: 978-3-540-69668-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics