Modes of Operation for Block Ciphers


Some relevant links:


Modes page in wikipedia


NISTís page on modes of operations



Some relevant papers:


Privacy Only


M. Bellare, A. Desai, E. Jokipii and P. Rogaway: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. , Proceedings of 38th Annual Symposium on Foundations of Computer Science, IEEE, 1997.


M. Bellare and P. Rogaway: Code-Based Game-Playing Proofs and the Security of Triple Encryption.
Advances in Cryptology - Eurocrypt 2006 Proceedings, Lecture Notes in Computer Science Vol. 4004, S. Vaudenay ed, Springer-Verlag, 2006.


Authenticated Encryption


John Black: Authenticated Encryption, Encyclopedia of Cryptography and Security, 2005


M. Bellare and C. Namprempre. : Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm.
Advances in Cryptology - Asiacrypt 2000


One-pass AE Schemes


Charanjit S. Jutla: Encryption Modes with Almost Free Message Integrity. Proc. Eurocrypt 2001, Cryptology ePrint Archive: Report 2000/039


Phillip Rogaway, Mihir Bellare, and John Black: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. ACM Transactions on Information and System Security (TISSEC), vol. 6, no. 3, pp. 365-403, August 2003. Earlier version, with Ted Krovetz, in Eighth ACM Conference on Computer and Communications Security (ACM CCS), ACM Press, pp. 196-205, 2001. Further information available from the OCB homepage.


Phillip Rogaway. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. Asiacrypt 2004. LNCS vol. 3329. Springer, 2004.


Debrup Chakraborty and Palash Sarkar : A General Construction of Tweakable Block Ciphers and Different Modes of Operations, IEEE Transactions on Information Theory, April 2008



Two-pass AE Schemes


Russ Housley, Doug Whiting and Niels Ferguson: The CCM mode


Mihir Bellare, Phillip Rogaway, and David Wagner. The EAX Mode of Operation (A Two-Pass Authenticated Encryption Scheme Optimized for Simplicity and Efficiency). Fast Software Encryption (FSE), LNCS vol. 3017, pp. 389-407, 2004


David A. McGrew and John Viega : T he Security and Performance of the Galois/Counter Mode of Operation (Full Version)

Tadayoshi Kohno and John Viega and Doug Whiting : CWC: A high-performance conventional authenticated encryption mode


Stefan Lucks: Two-Pass Authenticated Encryption Faster than Generic Composition, Fast Software Encryption 2005.


Authenticated Encryption with Associated Data


Phillip Rogaway: Authenticated-Encryption with Associated-Data. ACM Conference on Computer and Communications Security 2002 (CCS'02), ACM Press, pp. 98-107, September 2002.


Tweakable Enciphering Schemes


Shai Halevi and Phillip Rogaway. A Tweakable Enciphering Mode. CRYPTO '03, LNCS vol. 2729, pp. 482-499, Springer, 2003


Shai Halevi and Phillip Rogaway. A Parallelizable Enciphering Mode. Topics in Cryptology, CT-RSA 2004, LNCS vol. 2964, pp. 292-304, Springer, 2004


Peng Wang, Dengguo Feng and Wenling Wu : HCTR: A variable input length enciphering mode, CISC 2005


Debrup Chakraborty and Palash Sarkar: A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random, Proceedings of Fast Software Encryption 2006


Debrup Chakraborty and Palash Sarkar: HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach, IEEE Transactions on Information Theory, April 2008


Palash Sarkar : Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions, initial version in Proceedings of ICISC 2007






Slides of two lectures that I gave in CINVESTAV in 2006:

Lecture 1: slides

Lecture 2: slides(part1) slides(part2)