Modes of Operation for Block Ciphers

 

Some relevant links:

 

Modes page in wikipedia

 

NIST’s page on modes of operations

 

 

Some relevant papers:

 

Privacy Only

 

M. Bellare, A. Desai, E. Jokipii and P. Rogaway: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. , Proceedings of 38th Annual Symposium on Foundations of Computer Science, IEEE, 1997.

 

M. Bellare and P. Rogaway: Code-Based Game-Playing Proofs and the Security of Triple Encryption.
Advances in Cryptology - Eurocrypt 2006 Proceedings, Lecture Notes in Computer Science Vol. 4004, S. Vaudenay ed, Springer-Verlag, 2006.

 

Authenticated Encryption

 

John Black: Authenticated Encryption, Encyclopedia of Cryptography and Security, 2005

 

M. Bellare and C. Namprempre. : Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm.
Advances in Cryptology - Asiacrypt 2000

 

One-pass AE Schemes

 

Charanjit S. Jutla: Encryption Modes with Almost Free Message Integrity. Proc. Eurocrypt 2001, Cryptology ePrint Archive: Report 2000/039

 

Phillip Rogaway, Mihir Bellare, and John Black: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. ACM Transactions on Information and System Security (TISSEC), vol. 6, no. 3, pp. 365-403, August 2003. Earlier version, with Ted Krovetz, in Eighth ACM Conference on Computer and Communications Security (ACM CCS), ACM Press, pp. 196-205, 2001. Further information available from the OCB homepage.

 

Phillip Rogaway. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. Asiacrypt 2004. LNCS vol. 3329. Springer, 2004.

 

Debrup Chakraborty and Palash Sarkar : A General Construction of Tweakable Block Ciphers and Different Modes of Operations, IEEE Transactions on Information Theory, April 2008

 

 

Two-pass AE Schemes

 

Russ Housley, Doug Whiting and Niels Ferguson: The CCM mode

 

Mihir Bellare, Phillip Rogaway, and David Wagner. The EAX Mode of Operation (A Two-Pass Authenticated Encryption Scheme Optimized for Simplicity and Efficiency). Fast Software Encryption (FSE), LNCS vol. 3017, pp. 389-407, 2004

 

David A. McGrew and John Viega : T he Security and Performance of the Galois/Counter Mode of Operation (Full Version)

 

Tadayoshi Kohno and John Viega and Doug Whiting : CWC: A high-performance conventional authenticated encryption mode

 

Stefan Lucks: Two-Pass Authenticated Encryption Faster than Generic Composition, Fast Software Encryption 2005.

 

Authenticated Encryption with Associated Data

 

Phillip Rogaway: Authenticated-Encryption with Associated-Data. ACM Conference on Computer and Communications Security 2002 (CCS'02), ACM Press, pp. 98-107, September 2002.

 

Tweakable Enciphering Schemes

 

Shai Halevi and Phillip Rogaway. A Tweakable Enciphering Mode. CRYPTO '03, LNCS vol. 2729, pp. 482-499, Springer, 2003

 

Shai Halevi and Phillip Rogaway. A Parallelizable Enciphering Mode. Topics in Cryptology, CT-RSA 2004, LNCS vol. 2964, pp. 292-304, Springer, 2004

 

Peng Wang, Dengguo Feng and Wenling Wu : HCTR: A variable input length enciphering mode, CISC 2005

 

Debrup Chakraborty and Palash Sarkar: A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random, Proceedings of Fast Software Encryption 2006

 

Debrup Chakraborty and Palash Sarkar: HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach, IEEE Transactions on Information Theory, April 2008

 

Palash Sarkar : Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions, initial version in Proceedings of ICISC 2007

 

 

 

 

 

Slides of two lectures that I gave in CINVESTAV in 2006:

Lecture 1: slides

Lecture 2: slides(part1)  slides(part2)