## VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme (2004)

Citations: | 1 - 0 self |

### BibTeX

@MISC{Zoltak04vmpc-mac:a,

author = {Bartosz Zoltak},

title = {VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme},

year = {2004}

}

### OpenURL

### Abstract

A stream cipher based algorithm for computing Message Authentication Codes is described. The algorithm employs the internal state of the underlying cipher to minimize the required additional-toencryption computational e#ort and maintain general simplicity of the design. The scheme appears to provide proper statistical properties, a comfortable level of resistance against forgery attacks in a chosen ciphertext attack model and high e#ciency in software implementations.

### Citations

147 | Ocb: A block-cipher mode of operation for efficient authenticated encryption
- Rogaway, Bellare, et al.
(Show Context)
Citation Context ...1 Introduction In the past few years the interest in message authentication algorithms has been concentrated mostly on modes of operation of block ciphers. Examples of some recent designs include OCB =-=[4]-=-, OMAC [7], XCBC [6], EAX [8], CWC [9]. Parallely a growing interest in stream cipher design can be observed, however along with a relative shortage of dedicated message authentication schemes. Regard... |

121 | XOR MACs: New methods for message authentication using finite pseudorandom functions
- Bellare, Guerin, et al.
- 1995
(Show Context)
Citation Context ...ts. Given numbers of equal permutation elements probabilities Frequencies of occurrence of situations where in two permutations, generated from keys differing in one byte, there occurs a given number =-=(0, 1, 2, 3, 4, 5)-=- of equal elements in the corresponding positions and the average number of equal elements in the corresponding positions – showed no statistically significant deviation from their expected values in ... |

57 |
The eax mode of operation
- Bellare, Rogaway, et al.
- 2004
(Show Context)
Citation Context ...w years the interest in message authentication algorithms has been concentrated mostly on modes of operation of block ciphers. Examples of some recent designs include OCB [4], OMAC [7], XCBC [6], EAX =-=[8]-=-, CWC [9]. Parallely a growing interest in stream cipher design can be observed, however along with a relative shortage of dedicated message authentication schemes. Regarding two recent proposals – He... |

53 | A Practical Attack on Broadcast RC4 - Mantin, Shamir - 2001 |

52 | Statistical Analysis of the Alleged RC4 Keystream Generator - Fluhrer, McGrew |

50 | Message Authentication Using Hash Functions: the HMAC Construction
- Bellare, Canetti, et al.
- 1996
(Show Context)
Citation Context ...ts. Given numbers of equal permutation elements probabilities Frequencies of occurrence of situations where in two permutations, generated from keys differing in one byte, there occurs a given number =-=(0, 1, 2, 3, 4, 5)-=- of equal elements in the corresponding positions and the average number of equal elements in the corresponding positions – showed no statistically significant deviation from their expected values in ... |

25 |
K.: OMAC: One-Key CBC
- Iwata, Kurosawa
- 2003
(Show Context)
Citation Context ...tion In the past few years the interest in message authentication algorithms has been concentrated mostly on modes of operation of block ciphers. Examples of some recent designs include OCB [4], OMAC =-=[7]-=-, XCBC [6], EAX [8], CWC [9]. Parallely a growing interest in stream cipher design can be observed, however along with a relative shortage of dedicated message authentication schemes. Regarding two re... |

16 | Tadayoshi Kohno. Helix: Fast encryption and authentication in a single cryptographic primitive - Ferguson, Whiting, et al. - 2003 |

15 |
Differential Attacks against the Helix Stream Cipher
- Muller
- 2004
(Show Context)
Citation Context ...chemes. Regarding two recent proposals – Helix and Sober-128 stream ciphers with built-in MAC functionality – a powerful attack against the MAC algorithm of Sober-128 [10] and two weaknesses of Helix =-=[12]-=- were presented at FSE’04. This paper gives a proposition of a simple and software-efficient algorithm for computing Message Authentication Codes for the presented at FSE’04 VMPC Stream Cipher [13]. T... |

11 |
Fast Encryption and Authentication
- Gligor, Donescu
- 2001
(Show Context)
Citation Context ...e past few years the interest in message authentication algorithms has been concentrated mostly on modes of operation of block ciphers. Examples of some recent designs include OCB [4], OMAC [7], XCBC =-=[6]-=-, EAX [8], CWC [9]. Parallely a growing interest in stream cipher design can be observed, however along with a relative shortage of dedicated message authentication schemes. Regarding two recent propo... |

10 | Itsik Mantin, Adi Shamir: Weaknesses in the Key Scheduling Algorithm of RC4 - Fluhrer - 2001 |

8 | Rijmen, Sven Verdoolaege: Analysis Methods for (Alleged) RC4 - Knudsen, Meier, et al. - 1998 |

7 |
Namprempre: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm, full version, Cryptology ePrint Archive, Report 2000/025
- Bellare, Ch
- 2007
(Show Context)
Citation Context ...ts. Given numbers of equal permutation elements probabilities Frequencies of occurrence of situations where in two permutations, generated from keys differing in one byte, there occurs a given number =-=(0, 1, 2, 3, 4, 5)-=- of equal elements in the corresponding positions and the average number of equal elements in the corresponding positions – showed no statistically significant deviation from their expected values in ... |

7 |
Zoltak: VMPC One-Way Function and Stream Cipher
- Bartosz
(Show Context)
Citation Context ...ix [12] were presented at FSE’04. This paper gives a proposition of a simple and software-efficient algorithm for computing Message Authentication Codes for the presented at FSE’04 VMPC Stream Cipher =-=[13]-=-. The proposed scheme was designed to minimize the computational cost of the additional-to-encryption MAC-related operations by employing some data of the internal-state of the underlying cipher. This... |

6 |
Whiting D.: CWC: A high-performance conventional authenticated encryption mode. Fast Software Encryption
- Kohno, Viega
- 2004
(Show Context)
Citation Context ...he interest in message authentication algorithms has been concentrated mostly on modes of operation of block ciphers. Examples of some recent designs include OCB [4], OMAC [7], XCBC [6], EAX [8], CWC =-=[9]-=-. Parallely a growing interest in stream cipher design can be observed, however along with a relative shortage of dedicated message authentication schemes. Regarding two recent proposals – Helix and S... |

6 | Golic: Linear Statistical Weakness of Alleged RC4 Keystream Generator - Dj - 1997 |

3 |
Soichi Furuya: A MAC forgery attack on
- Watanabe
- 2004
(Show Context)
Citation Context ...edicated message authentication schemes. Regarding two recent proposals – Helix and Sober-128 stream ciphers with built-in MAC functionality – a powerful attack against the MAC algorithm of Sober-128 =-=[10]-=- and two weaknesses of Helix [12] were presented at FSE’04. This paper gives a proposition of a simple and software-efficient algorithm for computing Message Authentication Codes for the presented at ... |

3 | consortium: Performance of Optimized - NESSIE |