Design and Analysis of Authenticated Encryption Modes/ Arghya Bhattacharjee
Material type: TextPublication details: Kolkata: Indian Statistical Institute, 2024Description: xxv, 216 pagesDDC classification:- 23 652.8 Ar691
- Guided by Prof. Mridul Nandi
Item type | Current library | Call number | Status | Notes | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
THESIS | ISI Library, Kolkata | 652.8 Ar691 (Browse shelf(Opens below)) | Available | E-Thesis. Guided by Prof.Mridul Nandi | TH610 |
Browsing ISI Library, Kolkata shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | |||||
652.32 ED.205 Report of the Hindi Typewriter and Teleprinter Committee, pt.1 | 652.4 Of32 Office printing and duplicating | 652.5536 G955 Word for Windows 6 | 652.8 Ar691 Design and Analysis of Authenticated Encryption Modes/ | 652.8 G142 Cryptanalysis | 652.8 G621 Foundations of cryptography | 652.8 G621 Foundations of cryptography basic tools |
Thesis (Ph.D.)- Indian statistical Institute, 2024
Includes references
Preliminaries -- Oribatida -- ISAP+ -- OCB+ -- CENCPP*
Guided by Prof. Mridul Nandi
This thesis proposes and analyses the security of a few symmetric key modes. The first three of them are NAEAD modes, named Oribatida, ISAP+ and OCB+. Oribatida is lightweight, sponge-based, INT-RUP secure and achieves better than the default PRF security of a keyed sponge. ISAP+ is an instance of a generic EtHM involving a PRF and a hash, a generalisation of ISAP-type modes. The generic sponge hash of ISAP is replaced with a feed-forward variant of it in ISAP+, which results in better security. OCB+ uses OTBC-3 (a nonce-respecting BBB secure offset-based tweakable block-cipher) in an OCB-like mode to achieve BBB privacy. We conclude with a BBB secure NE mode named CENCPP*, which is a public permutation-based variant of the block-cipher-based mode CENC as well as a variable output length version of SoEM. All the relevant security proofs have been done using a method named Coefficients H Technique.
There are no comments on this title.