English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4200627      Online Users : 545
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/24940


    Title: A block cipher mode of operation with two keys
    Authors: Huang, Y.-L.;Leu, F.-Y.;Liu, J.-C.;Yang, J.-H.
    Contributors: Department of Computer Science, TungHai University
    Keywords: Block ciphers;Chain mode;Chosen-plaintext attack;Cipher feedbacks;Counter modes;Output feedback;Communication;Cryptography;Security of data;Information technology
    Date: 2013-03-25
    Issue Date: 2014-06-20T02:05:23Z (UTC)
    Publisher: Yogyakarta
    Abstract: In this paper, we propose a novel block cipher mode of operation (BCMO for short), named Output Protection Chain (OPC for short), which as a symmetric encryption structure is different from other existing BCMOs in that it employs two keys, rather than one key, to protect the output of the mode. The security threats of chosen-plaintext attacks on three existing common BCMOs, including the Cipher Feedback mode (CFB), the Output Feedback mode (OFB), and the Counter mode (CTR), are also analyzed. After that, we explain why the OPC mode (or simply the OPC) can effectively avoid chosen-plaintext attacks, and why its security level is higher than those of CFB, OFB, and CTR. ? 2013 Springer-Verlag.
    Relation: International Conference on Information and Communication Technology, ICT-EurAsia 2013
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),V.7804 LNCS,P.392-398
    Appears in Collections:[資訊工程學系所] 會議論文

    Files in This Item:

    There are no files associated with this item.



    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback