Presentation 2000/5/18
A New Encryption Scheme with Message Authentication Employing Pseudorandom Number Generator
Soichi FURUYA, Masashi TAKAHASHI, Dai WATANABE, Kazuo TAKARAGI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) A new blockwise encryption scheme employing pseudorancom number generator (PRNG) is presented. Assuming security security of PRNG, it provides security both of data confidentiality and integrity. The method is one path scheme so that this if effective particularly this schame is used for a long message. Because of making use of PRNG, performance can be fast in addition to benefits of preprocessing and parallel computation. For these reasons, the maxmum throughput is very high. As an example, we implemented our scheme with PANAMA. In our implementation, encryption and decryption perform at 202Mbps and 207Mbops on an Alpha processor at 600MHz, where the probability of malicious forgery is less than 2^-32 for a 64GByte message. We also estimated hardware implementation. With additional 40Kgate of PRNG, the maxmum throughput can achieve 9.6Gbps. As for smallest implementation, the additional circuit can be implemented with 3K gate.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Message Authentication / Pseudorandom Number Generator / Imformation Theoretical Security / Provable Security / Stream Cipher / Mode of Operation
Paper # ISEC2000-8
Date of Issue

Conference Information
Committee ISEC
Conference Date 2000/5/18(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A New Encryption Scheme with Message Authentication Employing Pseudorandom Number Generator
Sub Title (in English)
Keyword(1) Message Authentication
Keyword(2) Pseudorandom Number Generator
Keyword(3) Imformation Theoretical Security
Keyword(4) Provable Security
Keyword(5) Stream Cipher
Keyword(6) Mode of Operation
1st Author's Name Soichi FURUYA
1st Author's Affiliation Security Systems Research Center, Hitachi, Ltd, Systems Development Laboratory()
2nd Author's Name Masashi TAKAHASHI
2nd Author's Affiliation Security Systems Research Center, Hitachi, Ltd, Systems Development Laboratory
3rd Author's Name Dai WATANABE
3rd Author's Affiliation Security Systems Research Center, Hitachi, Ltd, Systems Development Laboratory
4th Author's Name Kazuo TAKARAGI
4th Author's Affiliation Security Systems Research Center, Hitachi, Ltd, Systems Development Laboratory
Date 2000/5/18
Paper # ISEC2000-8
Volume (vol) vol.100
Number (no) 76
Page pp.pp.-
#Pages 35
Date of Issue