Abstract

AbstractIt is highly desirable that a real‐time crypto system should be designed to offer a strong security level by assuring both the privacy and integrity together in the same podium. However, the conventional stream cipher modes of operation (counter (CTR), cipher feedback (CFB), and Output Feedback (OFB)), often used in several real‐time applications, are unable to prevent any unauthorized message modification, which may often lead to several active attacks. This article shows a way to construct the real‐time based Authenticated Encryption (AE) environment, where the real‐time key stream is generated from any secure block algorithm like Advanced Encryption Standard (AES). Accordingly, in order to demonstrate the principle of the real‐time based AE environment, here we introduce two modes of operations, namely integrity aware real‐time based counter (IAR‐CTR) and cipher feedback (IAR‐CFB) modes, where both the proposed modes of operations can guarantee to offer both the confidentiality and message integrity in a single pass without any Message Authentication Code (MAC) or even any kind of non‐crypto checksum Cyclic Redundancy Check (CRC) support. Besides, here we argue that both the proposed real‐time based AE environments are quite robust against several active attacks, for example, message stream modification attacks and chosen‐plain‐text attacks, and at the same time, they can also be useful to deal with some other issues like ‘limited error propagation’ existing in several conventional stream cipher modes like CFB, OFB, and CTR. Copyright © 2015 John Wiley & Sons, Ltd.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.