FAST: DISK ENCRYPTION AND BEYOND

被引:1
|
作者
Chakraborty, Debrup [1 ]
Ghosh, Sebati [1 ]
Lopez, Cuauhtemoc Mancillas [2 ]
Sarkar, Palash [1 ]
机构
[1] Indian Stat Inst, 203,BT Rd, Kolkata 700108, India
[2] CINVESTAV IPN, Dept Comp Sci, Mexico City 07360, DF, Mexico
关键词
Disk encryption; tweakable enciphering schemes; pseudo-random func-tion; Horner; BRW; TWEAKABLE ENCIPHERING SCHEMES; SECURITY TREATMENT; MODE; CIPHER;
D O I
10.3934/amc.2020108
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work introduces FAST which is a new family of tweakable enciphering schemes. Several instantiations of FAST are described. These are targeted towards two goals, the specific task of disk encryption and a more general scheme suitable for a wide variety of practical applications. A major contribution of this work is to present detailed and careful software implementations of all of these instantiations. For disk encryption, the results from the implementations show that FAST compares very favourably to the IEEE disk encryption standards XCB and EME2 as well as the more recent proposal AEZ. FAST is built using a fixed input length pseudo-random function and an appropriate hash function. It uses a single-block key, is parallelisable and can be instantiated using only the encryption function of a block cipher. The hash function can be instantiated using either the Horner's rule based usual polynomial hashing or hashing based on the more efficient Bernstein Rabin-Winograd polynomials. Security of FAST has been rigorously analysed using the standard provable security approach and concrete security bounds have been derived. Based on our implementation results, we put forward FAST as a serious candidate for standardisation and deployment.
引用
收藏
页码:185 / 230
页数:46
相关论文
共 50 条
  • [21] DATA STORAGE SECURITY AND FULL DISK ENCRYPTION
    Alekseev, E. K.
    Akhmetzyanova, L. R.
    Babueva, A. A.
    Smyshlyaev, S., V
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (49): : 78 - 97
  • [22] The analysis of Windows Vista disk encryption algorithm
    El-Fotouh, Mohamed Abo
    Diepold, Klaus
    [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 113 - 126
  • [23] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44
  • [24] Fast encryption and authentication: XCBC encryption and XECB authentication modes
    Gligor, VD
    Donescu, P
    [J]. FAST SOFTWARE ENCRYPTION, 2002, 2355 : 92 - 108
  • [25] BEYOND THE BLACK DISK LIMIT
    TROSHIN, SM
    TYURIN, NE
    [J]. PHYSICS LETTERS B, 1993, 316 (01) : 175 - 177
  • [26] Identity-based encryption and beyond
    Martin, Luther
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (05) : 62 - 64
  • [27] Formatted Encryption Beyond Regular Languages
    Luchaup, Daniel
    Shrimpton, Thomas
    Ristenpart, Thomas
    Jha, Somesh
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1292 - 1303
  • [28] Efficient Disk Encryption and Verification through Trusted Nonce
    Hou, Fangyong
    Gu, Dawu
    Xiao, Nong
    Cai, Zhiping
    [J]. 2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 82 - 87
  • [29] Disk encryption: do we need to preserve length?
    Debrup Chakraborty
    Cuauhtemoc Mancillas López
    Palash Sarkar
    [J]. Journal of Cryptographic Engineering, 2018, 8 : 49 - 69
  • [30] FAST PERMUTING ON DISK ARRAYS
    CORMEN, TH
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1993, 17 (1-2) : 41 - 57