Modes
of Operation for Block Ciphers
Some relevant links:
NIST’s page on modes
of operations
Some relevant papers:
Privacy Only
M.
Bellare, A. Desai, E. Jokipii and P. Rogaway: A Concrete Security Treatment of Symmetric Encryption:
Analysis of the DES Modes of Operation. , Proceedings of 38th Annual Symposium on
Foundations of Computer Science, IEEE, 1997.
M.
Bellare and P. Rogaway: Code-Based Game-Playing Proofs and
the Security of Triple Encryption.
Advances in Cryptology - Eurocrypt 2006 Proceedings, Lecture Notes in Computer
Science Vol. 4004, S. Vaudenay ed, Springer-Verlag, 2006.
Authenticated Encryption
John
Black: Authenticated
Encryption, Encyclopedia of Cryptography and Security, 2005
M.
Bellare and C. Namprempre. : Authenticated Encryption: Relations
among notions and analysis of the generic composition paradigm.
Advances in Cryptology - Asiacrypt 2000
One-pass AE Schemes
Charanjit S. Jutla: Encryption Modes with Almost Free
Message Integrity. Proc. Eurocrypt 2001, Cryptology ePrint
Archive: Report 2000/039
Phillip Rogaway, Mihir Bellare, and
John Black: OCB: A Block-Cipher Mode of Operation for
Efficient Authenticated Encryption. ACM Transactions on
Information and System Security (TISSEC), vol. 6, no. 3, pp. 365-403,
August 2003. Earlier version, with Ted Krovetz, in Eighth ACM Conference on
Computer and Communications Security (ACM CCS), ACM Press, pp. 196-205,
2001. Further information available from the OCB homepage.
Phillip Rogaway. Efficient Instantiations of
Tweakable Blockciphers and Refinements to Modes OCB and PMAC. Asiacrypt
2004. LNCS vol. 3329. Springer, 2004.
Debrup
Chakraborty and Palash Sarkar : A General Construction of Tweakable
Block Ciphers and Different Modes of Operations, IEEE Transactions on
Information Theory, April 2008
Two-pass AE Schemes
Russ Housley, Doug Whiting and Niels Ferguson: The CCM
mode
Mihir Bellare, Phillip Rogaway, and
David Wagner. The EAX Mode of Operation (A Two-Pass
Authenticated Encryption Scheme Optimized for Simplicity and Efficiency). Fast
Software Encryption (FSE), LNCS vol. 3017,
pp. 389-407, 2004
David A.
McGrew and John Viega : T he Security and Performance of the Galois/Counter Mode of Operation
(Full Version)
Tadayoshi
Kohno and John Viega and Doug Whiting : CWC: A high-performance
conventional authenticated encryption mode
Stefan Lucks: Two-Pass
Authenticated Encryption Faster than Generic Composition, Fast Software
Encryption 2005.
Authenticated Encryption with
Associated Data
Phillip Rogaway: Authenticated-Encryption with Associated-Data. ACM Conference
on Computer and Communications Security 2002
(CCS'02), ACM Press, pp. 98-107, September 2002.
Tweakable Enciphering Schemes
Shai Halevi and Phillip Rogaway. A Tweakable Enciphering Mode. CRYPTO '03, LNCS vol. 2729, pp. 482-499, Springer, 2003
Shai Halevi and Phillip Rogaway. A Parallelizable Enciphering Mode. Topics in
Cryptology, CT-RSA 2004, LNCS vol. 2964, pp.
292-304, Springer, 2004
Peng Wang, Dengguo Feng and Wenling
Wu : HCTR: A variable input length enciphering mode, CISC 2005
Debrup Chakraborty
and Palash Sarkar: A New
Mode of Encryption Providing A Tweakable Strong Pseudo-Random, Proceedings of
Fast Software Encryption 2006
Debrup Chakraborty
and Palash Sarkar: HCH: A New Tweakable Enciphering
Scheme Using the Hash-Counter-Hash Approach, IEEE Transactions on Information Theory, April
2008
Palash Sarkar : Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash
Functions, initial
version in Proceedings of ICISC 2007
Slides of two lectures that I
gave in CINVESTAV in 2006:
Lecture 1: slides
Lecture 2: slides(part1) slides(part2)