FAST: DISK ENCRYPTION AND BEYOND

被引:1
|
作者
Chakraborty, Debrup [1 ]
Ghosh, Sebati [1 ]
Lopez, Cuauhtemoc Mancillas [2 ]
Sarkar, Palash [1 ]
机构
[1] Indian Stat Inst, 203,BT Rd, Kolkata 700108, India
[2] CINVESTAV IPN, Dept Comp Sci, Mexico City 07360, DF, Mexico
关键词
Disk encryption; tweakable enciphering schemes; pseudo-random func-tion; Horner; BRW; TWEAKABLE ENCIPHERING SCHEMES; SECURITY TREATMENT; MODE; CIPHER;
D O I
10.3934/amc.2020108
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work introduces FAST which is a new family of tweakable enciphering schemes. Several instantiations of FAST are described. These are targeted towards two goals, the specific task of disk encryption and a more general scheme suitable for a wide variety of practical applications. A major contribution of this work is to present detailed and careful software implementations of all of these instantiations. For disk encryption, the results from the implementations show that FAST compares very favourably to the IEEE disk encryption standards XCB and EME2 as well as the more recent proposal AEZ. FAST is built using a fixed input length pseudo-random function and an appropriate hash function. It uses a single-block key, is parallelisable and can be instantiated using only the encryption function of a block cipher. The hash function can be instantiated using either the Horner's rule based usual polynomial hashing or hashing based on the more efficient Bernstein Rabin-Winograd polynomials. Security of FAST has been rigorously analysed using the standard provable security approach and concrete security bounds have been derived. Based on our implementation results, we put forward FAST as a serious candidate for standardisation and deployment.
引用
收藏
页码:185 / 230
页数:46
相关论文
共 50 条
  • [41] Bypassing Full Disk Encryption with Virtual Machine Introspection
    Hebbal, Yacine
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [42] Probability Based Selective Encryption Scheme for Fast Encryption of Medical Images
    Manjula, G.
    Mohan, H. S.
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS FOR COMPUTING RESEARCH (ICAICR '19), 2019,
  • [43] A Fast Hyperchaotic Image Encryption Scheme
    Ma, Xiaojuan
    Wang, Chunhua
    Qiu, Wenlu
    Yu, Fei
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2023, 33 (05):
  • [44] Fast encryption of various types of messages
    Erosh, Igor
    Sergeev, Mikhail
    [J]. Periodica Polytechnica Mechanical Engineering, 2007, 51 (01): : 23 - 32
  • [45] A novel fast exponentiation algorithm for encryption
    Shi Jianghong
    Zhou Ting
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 245 - +
  • [46] AEGIS: A Fast Authenticated Encryption Algorithm
    Wu, Hongjun
    Preneel, Bart
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 185 - 201
  • [47] Fast Searchable Encryption With Tunable Locality
    Demertzis, Ioannis
    Papamanthou, Charalampos
    [J]. SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2017, : 1053 - 1067
  • [48] Fast hashing and stream encryption with PANAMA
    Daemen, J
    Clapp, C
    [J]. FAST SOFTWARE ENCRYPTION, 1998, 1372 : 60 - 74
  • [49] Honey Encryption Beyond Message Recovery Security
    Jaeger, Joseph
    Ristenpart, Thomas
    Tang, Qiang
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 758 - 788
  • [50] HI clouds beyond the Galactic disk
    Lockman, FJ
    [J]. HOW DOES THE GALAXY WORK?: A GALACTIC TERTULIA WITH DON COX AND RON REYNOLDS, 2004, 315 : 17 - 24