How to construct pseudorandom permutations from pseudorandom functions
SIAM Journal on Computing - Special issue on cryptography
Hi-index | 0.00 |
This paper describes a new method for authenticating and encrypting messages. Our method employs any encryption algorithm as underlying block cipher. Proposed algorithm uses two key values, first key for the underlying encryption algorithm, and the second key for the new mode. The proven security describes the attacker inability to forge the new Encryption-Authentication algorithm, in terms of his (presumed) inability to break the underlying random S-box, the second key, and the underlying encryption function.