Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers - Mustafa Khairallah

Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers

Buch | Hardcover
192 Seiten
2021 | 1st ed. 2022
Springer Verlag, Singapore
978-981-16-6343-7 (ISBN)
160,49 inkl. MwSt
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.

Introduction.- Arguments for Tweakable Block Cipher-Based Cryptorgaphy.- State of the Art of TBC-based Authenticated Encryption.- Rekey-and-Chain: Concepts and Analysis of Lightweight TBC-based Authenticated Encyrption Proposals.- Romulus: Lightweight TBC-Based Authenticated Encryption.- Pushing the limits of the Cost of TBC-based Authenticated Encryption: Remus.- Leakage-Resilient Authenticated Encryption using TBC: TEDT and AET-LR.- Multi-key AEAD Security using TBCs.- Conclusions.

Erscheinungsdatum
Reihe/Serie Computer Architecture and Design Methodologies
Zusatzinfo 110 Illustrations, color; 27 Illustrations, black and white; XVIII, 192 p. 137 illus., 110 illus. in color.
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Bauwesen
Technik Elektrotechnik / Energietechnik
Schlagworte Authenticated Encryption with Associated Data (AEAD) • Cryptographic Hardware • Hash Functions • Lightweight Authenticated Encryption • Lightweight Leakage Resilient • Rekey-and-Chain • REMU NIST • Romulus NIST • symmetric key cryptography • Tweakable Block Ciphers
ISBN-10 981-16-6343-2 / 9811663432
ISBN-13 978-981-16-6343-7 / 9789811663437
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95