1 / 18

The OCB1

The OCB1. The OCB1 (Contd.). Instantiation of OCB1 with a XEX blockcipher. The PMAC Algorithm. The PMAC Algorithm (contd.). The PMAC Algorithm (contd.). AEAD Schemes. Using OCB and PMAC for AEAD Let OCB =( K,E,D ) Let the message be M and header be H Obtain C||t = E(K, M)

dian
Download Presentation

The OCB1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The OCB1

  2. The OCB1 (Contd.)

  3. Instantiation of OCB1 with a XEX blockcipher

  4. The PMAC Algorithm

  5. The PMAC Algorithm (contd.)

  6. The PMAC Algorithm (contd.)

  7. AEAD Schemes Using OCB and PMAC for AEAD Let OCB =(K,E,D) Let the message be M and header be H Obtain C||t = E(K, M) Obtain d = PMAC(K,H) The final ciphertext is C||(t XOR d)

  8. AEAD Schemes (cont.) Rogaway proposed a general way to construct AEAD schemes from a secure symmetric encryption scheme and a pseudorandom function These schemes are called generic composition schemes. Rogaway suggests two ways: Mac then Encrypt Encrypt then Mac

  9. Generic Composition: Encrypt then Mac

  10. Generic Composition: Mac then Encrypt

  11. The CMC Mode of Operation

  12. Encryption and decryption using CMC

  13. The EME Mode of Operation

  14. Encryption and decryption using EME

  15. HCTR Mode of operation

  16. HCTR Mode of operation

  17. HCTR Mode of operation

  18. PEP Mode of Operation

More Related