A MAC Mode for Lightweight Block Ciphers View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2016-07-20

AUTHORS

Atul Luykx , Bart Preneel , Elmar Tischhauser , Kan Yasuda

ABSTRACT

Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead to impractical limits on how much data a mode of operation can process per key. MAC (message authentication code) modes of operation frequently have bounds which degrade with both the number of messages queried and the message length. We present a MAC mode of operation, LightMAC, where the message length has no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms, but also allows high-performance parallel implementations. We highlight this in a comprehensive implementation study, instantiating LightMAC with PRESENT and the AES. Moreover, LightMAC allows flexible trade-offs between rate and maximum message length. Unlike PMAC and its many derivatives, LightMAC is not covered by patents. Altogether, this makes it a promising authentication primitive for a wide range of platforms and use cases. More... »

PAGES

43-59

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-52993-5_3

DOI

http://dx.doi.org/10.1007/978-3-662-52993-5_3

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1009107110


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "iMinds, Ghent, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering, ESAT/COSIC, KU Leuven, Leuven, Belgium", 
            "iMinds, Ghent, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Luykx", 
        "givenName": "Atul", 
        "id": "sg:person.010234250021.33", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010234250021.33"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds, Ghent, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering, ESAT/COSIC, KU Leuven, Leuven, Belgium", 
            "iMinds, Ghent, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Applied Mathematics and Computer Science, Technical University of Denmark, Lyngby, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.5170.3", 
          "name": [
            "Department of Applied Mathematics and Computer Science, Technical University of Denmark, Lyngby, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tischhauser", 
        "givenName": "Elmar", 
        "id": "sg:person.011773174147.61", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011773174147.61"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "NTT Secure Platform Laboratories, NTT Corporation, Tokyo, Japan", 
          "id": "http://www.grid.ac/institutes/grid.419819.c", 
          "name": [
            "NTT Secure Platform Laboratories, NTT Corporation, Tokyo, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yasuda", 
        "givenName": "Kan", 
        "id": "sg:person.016111147443.09", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016111147443.09"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2016-07-20", 
    "datePublishedReg": "2016-07-20", 
    "description": "Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead to impractical limits on how much data a mode of operation can process per key. MAC (message authentication code) modes of operation frequently have bounds which degrade with both the number of messages queried and the message length. We present a MAC mode of operation, LightMAC, where the message length has no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms, but also allows high-performance parallel implementations. We highlight this in a comprehensive implementation study, instantiating LightMAC with PRESENT and the AES. Moreover, LightMAC allows flexible trade-offs between rate and maximum message length. Unlike PMAC and its many derivatives, LightMAC is not covered by patents. Altogether, this makes it a promising authentication primitive for a wide range of platforms and use cases.", 
    "editor": [
      {
        "familyName": "Peyrin", 
        "givenName": "Thomas", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-662-52993-5_3", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-662-52992-8", 
        "978-3-662-52993-5"
      ], 
      "name": "Fast Software Encryption", 
      "type": "Book"
    }, 
    "keywords": [
      "message length", 
      "MAC mode", 
      "block cipher", 
      "high-performance parallel implementation", 
      "resource-constrained platforms", 
      "block size", 
      "number of messages", 
      "magnitude more data", 
      "lightweight block ciphers", 
      "block cipher design", 
      "authentication primitive", 
      "maximum message length", 
      "lightweight cryptography", 
      "parallel implementation", 
      "LightMAC", 
      "cipher design", 
      "security", 
      "mode of operation", 
      "cipher", 
      "platform", 
      "more data", 
      "authentication", 
      "cryptography", 
      "overhead", 
      "primitives", 
      "key", 
      "operation", 
      "messages", 
      "mode", 
      "bits", 
      "implementation", 
      "communication", 
      "PMAC", 
      "AES", 
      "wide range", 
      "environment", 
      "data", 
      "implementation study", 
      "bounds", 
      "efficiency", 
      "size", 
      "design", 
      "length", 
      "order", 
      "range", 
      "number", 
      "limit", 
      "results", 
      "fact", 
      "effect", 
      "rate", 
      "patents", 
      "present", 
      "cases", 
      "study", 
      "derivatives"
    ], 
    "name": "A MAC Mode for Lightweight Block Ciphers", 
    "pagination": "43-59", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1009107110"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-52993-5_3"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-52993-5_3", 
      "https://app.dimensions.ai/details/publication/pub.1009107110"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:59", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_453.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-662-52993-5_3"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-52993-5_3'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-52993-5_3'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-52993-5_3'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-52993-5_3'


 

This table displays all metadata directly associated to this object as RDF triples.

143 TRIPLES      22 PREDICATES      80 URIs      73 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-52993-5_3 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N800ecde696c64b619e357f1f50223146
4 schema:datePublished 2016-07-20
5 schema:datePublishedReg 2016-07-20
6 schema:description Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead to impractical limits on how much data a mode of operation can process per key. MAC (message authentication code) modes of operation frequently have bounds which degrade with both the number of messages queried and the message length. We present a MAC mode of operation, LightMAC, where the message length has no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms, but also allows high-performance parallel implementations. We highlight this in a comprehensive implementation study, instantiating LightMAC with PRESENT and the AES. Moreover, LightMAC allows flexible trade-offs between rate and maximum message length. Unlike PMAC and its many derivatives, LightMAC is not covered by patents. Altogether, this makes it a promising authentication primitive for a wide range of platforms and use cases.
7 schema:editor N50356ed638374629acb8e12c3ae72b1b
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N97f4206fe2bf45d7ac05ef4fa24139d4
11 schema:keywords AES
12 LightMAC
13 MAC mode
14 PMAC
15 authentication
16 authentication primitive
17 bits
18 block cipher
19 block cipher design
20 block size
21 bounds
22 cases
23 cipher
24 cipher design
25 communication
26 cryptography
27 data
28 derivatives
29 design
30 effect
31 efficiency
32 environment
33 fact
34 high-performance parallel implementation
35 implementation
36 implementation study
37 key
38 length
39 lightweight block ciphers
40 lightweight cryptography
41 limit
42 magnitude more data
43 maximum message length
44 message length
45 messages
46 mode
47 mode of operation
48 more data
49 number
50 number of messages
51 operation
52 order
53 overhead
54 parallel implementation
55 patents
56 platform
57 present
58 primitives
59 range
60 rate
61 resource-constrained platforms
62 results
63 security
64 size
65 study
66 wide range
67 schema:name A MAC Mode for Lightweight Block Ciphers
68 schema:pagination 43-59
69 schema:productId N5461e01411374cfab6e2e7cfd89e3a0f
70 N5dc12bd7e15f41f5ac60ae688080d7e8
71 schema:publisher N06a32001a46f48e884d6a4ca4979603f
72 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009107110
73 https://doi.org/10.1007/978-3-662-52993-5_3
74 schema:sdDatePublished 2022-10-01T06:59
75 schema:sdLicense https://scigraph.springernature.com/explorer/license/
76 schema:sdPublisher N0156f777457f41bb8331d7b8f96946d8
77 schema:url https://doi.org/10.1007/978-3-662-52993-5_3
78 sgo:license sg:explorer/license/
79 sgo:sdDataset chapters
80 rdf:type schema:Chapter
81 N0156f777457f41bb8331d7b8f96946d8 schema:name Springer Nature - SN SciGraph project
82 rdf:type schema:Organization
83 N06a32001a46f48e884d6a4ca4979603f schema:name Springer Nature
84 rdf:type schema:Organisation
85 N356ab2aca761458eaab3d19d364aa6b9 rdf:first sg:person.016111147443.09
86 rdf:rest rdf:nil
87 N50356ed638374629acb8e12c3ae72b1b rdf:first Nab05e8ca8a6f4c74bb07f11143c43016
88 rdf:rest rdf:nil
89 N5461e01411374cfab6e2e7cfd89e3a0f schema:name doi
90 schema:value 10.1007/978-3-662-52993-5_3
91 rdf:type schema:PropertyValue
92 N5dc12bd7e15f41f5ac60ae688080d7e8 schema:name dimensions_id
93 schema:value pub.1009107110
94 rdf:type schema:PropertyValue
95 N800ecde696c64b619e357f1f50223146 rdf:first sg:person.010234250021.33
96 rdf:rest Nb0c13ea88ae54b5aa128c1b520045154
97 N97f4206fe2bf45d7ac05ef4fa24139d4 schema:isbn 978-3-662-52992-8
98 978-3-662-52993-5
99 schema:name Fast Software Encryption
100 rdf:type schema:Book
101 Nab05e8ca8a6f4c74bb07f11143c43016 schema:familyName Peyrin
102 schema:givenName Thomas
103 rdf:type schema:Person
104 Nb0c13ea88ae54b5aa128c1b520045154 rdf:first sg:person.011115044357.39
105 rdf:rest Nd51a77a66ddf45caae5e812b0d189eea
106 Nd51a77a66ddf45caae5e812b0d189eea rdf:first sg:person.011773174147.61
107 rdf:rest N356ab2aca761458eaab3d19d364aa6b9
108 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
109 schema:name Information and Computing Sciences
110 rdf:type schema:DefinedTerm
111 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
112 schema:name Data Format
113 rdf:type schema:DefinedTerm
114 sg:person.010234250021.33 schema:affiliation grid-institutes:grid.56912.39
115 schema:familyName Luykx
116 schema:givenName Atul
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010234250021.33
118 rdf:type schema:Person
119 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.56912.39
120 schema:familyName Preneel
121 schema:givenName Bart
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
123 rdf:type schema:Person
124 sg:person.011773174147.61 schema:affiliation grid-institutes:grid.5170.3
125 schema:familyName Tischhauser
126 schema:givenName Elmar
127 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011773174147.61
128 rdf:type schema:Person
129 sg:person.016111147443.09 schema:affiliation grid-institutes:grid.419819.c
130 schema:familyName Yasuda
131 schema:givenName Kan
132 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016111147443.09
133 rdf:type schema:Person
134 grid-institutes:grid.419819.c schema:alternateName NTT Secure Platform Laboratories, NTT Corporation, Tokyo, Japan
135 schema:name NTT Secure Platform Laboratories, NTT Corporation, Tokyo, Japan
136 rdf:type schema:Organization
137 grid-institutes:grid.5170.3 schema:alternateName Department of Applied Mathematics and Computer Science, Technical University of Denmark, Lyngby, Denmark
138 schema:name Department of Applied Mathematics and Computer Science, Technical University of Denmark, Lyngby, Denmark
139 rdf:type schema:Organization
140 grid-institutes:grid.56912.39 schema:alternateName iMinds, Ghent, Belgium
141 schema:name Department of Electrical Engineering, ESAT/COSIC, KU Leuven, Leuven, Belgium
142 iMinds, Ghent, Belgium
143 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...