Presentation 2006-05-24
Security of Modified Counter Modes(HISC2006)
Hidenori Kuwakado, Masakatu Morii,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Iwata has shown the method for building a pseudorandom function from a random permutation. Unlike previous building methods, his method provides the pseudorandom function such that the output size is larger than that of the underlying random permutation. If his method is secure, then his method is applicable to construct the efficient counter mode. In this paper we discuss the security of his method by using the security analysis of a previous building method. We show that it is not easy to improve the security of pseudorandom functions built by similar methods substantially.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) cryptography / encryption mode / block cipher / counter mode
Paper # IT2006-10
Date of Issue

Conference Information
Committee IT
Conference Date 2006/5/17(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Theory (IT)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Security of Modified Counter Modes(HISC2006)
Sub Title (in English)
Keyword(1) cryptography
Keyword(2) encryption mode
Keyword(3) block cipher
Keyword(4) counter mode
1st Author's Name Hidenori Kuwakado
1st Author's Affiliation Faculty of Engineering, Kobe University()
2nd Author's Name Masakatu Morii
2nd Author's Affiliation Faculty of Engineering, Kobe University
Date 2006-05-24
Paper # IT2006-10
Volume (vol) vol.106
Number (no) 59
Page pp.pp.-
#Pages 4
Date of Issue