Paper 2003/177
Building Secure Cryptographic Transforms, or How to Encrypt and MAC
Tadayoshi Kohno, Adriana Palacio, and John Black
Abstract
We describe several notions of ``cryptographic transforms,'' symmetric schemes designed to meet a variety of privacy and authenticity goals. We consider goals, such as replay-avoidance and in-order packet delivery, that have not been fully addressed in previous works in this area. We then provide an analysis of possible ways to combine standard encryption and message authentication schemes in order to provably meet these goals. Our results further narrow the gap between the provable-security results from the theoretical community and the needs of developers who implement real systems.
Metadata
- Available format(s)
- PDF PS
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Applied cryptographycryptographic transformsauthenticated encryptionprivacyauthenticitysecurity proofs
- Contact author(s)
- tkohno @ cs ucsd edu
- History
- 2003-08-28: received
- Short URL
- https://ia.cr/2003/177
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2003/177, author = {Tadayoshi Kohno and Adriana Palacio and John Black}, title = {Building Secure Cryptographic Transforms, or How to Encrypt and {MAC}}, howpublished = {Cryptology {ePrint} Archive, Paper 2003/177}, year = {2003}, url = {https://eprint.iacr.org/2003/177} }