Presentation | 2006-05-24 Security of Modified Counter Modes(HISC2006) Hidenori Kuwakado, Masakatu Morii, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Iwata has shown the method for building a pseudorandom function from a random permutation. Unlike previous building methods, his method provides the pseudorandom function such that the output size is larger than that of the underlying random permutation. If his method is secure, then his method is applicable to construct the efficient counter mode. In this paper we discuss the security of his method by using the security analysis of a previous building method. We show that it is not easy to improve the security of pseudorandom functions built by similar methods substantially. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | cryptography / encryption mode / block cipher / counter mode |
Paper # | IT2006-10 |
Date of Issue |
Conference Information | |
Committee | IT |
---|---|
Conference Date | 2006/5/17(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Theory (IT) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Security of Modified Counter Modes(HISC2006) |
Sub Title (in English) | |
Keyword(1) | cryptography |
Keyword(2) | encryption mode |
Keyword(3) | block cipher |
Keyword(4) | counter mode |
1st Author's Name | Hidenori Kuwakado |
1st Author's Affiliation | Faculty of Engineering, Kobe University() |
2nd Author's Name | Masakatu Morii |
2nd Author's Affiliation | Faculty of Engineering, Kobe University |
Date | 2006-05-24 |
Paper # | IT2006-10 |
Volume (vol) | vol.106 |
Number (no) | 59 |
Page | pp.pp.- |
#Pages | 4 |
Date of Issue |