COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS | ||
Journal of University of Anbar for Pure Science | ||
Article 29, Volume 4, Issue 1, April 2010, Pages 95-104 PDF (385.85 K) | ||
Document Type: Research Paper | ||
DOI: 10.37652/juaps.2010.15401 | ||
Authors | ||
Ali M. Sagheer* 1; Ahmed T. Suod2 | ||
1College of Computer, Al-Anbar University, Iraq | ||
2College of Science, Al-Anbar University, Iraq | ||
Abstract | ||
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or byte (sometimes even one 32-bit word) at a time. The Block cipher modes of operation can be applied as both stream and block cipher.In this paper we introduce three developments of Counter Mode of Operation of Block cipher. These developments merge between advantages of Counter Mode with other Modes. This gives a good secure Modes for General purpose block-oriented transmission Authentication, Random access, Stream-oriented transmission over noisy channel. | ||
Keywords | ||
Block Cipher; stream cipher; Modes of Operations | ||
References | ||
[1] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, New York, 2nd edition, 1996.
[2] W. Stallings, Cryptography and Network Security, Principle and Practice, Addison Wesley, 2004.
[3] B. Preneel, M. Nuttin, V. Rijmen, and J. Buelens, “Cryptanalysis of the CFB mode of the DES with a Reduced Number of Rounds,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 212–223.
[4] C. M. Campbell, “Design and Specification of Cryptographic Capabilities,” IEEE Computer Society Magazine, v. 16, n. 6, Nov 1978, pp. 15–19.
[5] S.T. Kent, “Encryption–Based Protection Protocols for Interactive User–Computer Communications,” MIT/LCS/TR–162, MIT Laboratory for Computer Science, May 1976.
[6] W. Diffie and M.E. Hellman, “Privacy and Authentication: An Introduction to Cryptography,” Proceedings of the IEEE, v. 67, n. 3, Mar 1979, pp. 397–427.
[7] T. Herlestam, “Critical Remarks on Some Public–Key Cryptosystems,” BIT, v. 18, 1978, pp. 493–496.
[8] Lipmaa, H.; Rogaway, P.; and Wagner, D. "CTR Mode Encryption." NIST First Modes of Operation Workshop, October 2000. http://csrc.nist.gov/encryption/modes [9] Alan G. Konheim, Computer Security
And Cryptography, John Wiley & Sons Inc., 2007. [10] Voydock, V., and Kent., S. "Security Mechanisms in High-Level Network Protocols." Computing Surveys, June 1983.
[11] M. Stamp, Information Security Principles and practice, JohnWiley & Sons, Inc., 2006. | ||
Statistics Article View: 90 PDF Download: 88 |