Skip to main content

Questions tagged [tweakable-cipher]

A block cipher is a family of permutations where the key selects a particular permutation from that family. With a tweakable blockcipher both key and tweak are used to select a permutation. So tweak and key are related.

2 votes
0 answers
43 views

To my mind, there are two go-to uses for a tweak input for a block cipher or mode of operation: A counter to make each block in a sequence of message blocks encrypt differently. A counter for a ...
Melab's user avatar
  • 4,328
1 vote
0 answers
35 views

The QCB Efficient Quantum-Secure Authentication Encryption mode is based on a tweak block cipher. It processes a key , iv , associated data, and plaintext data into ciphertext data and a message ...
cookiecipher's user avatar
0 votes
0 answers
62 views

I have an application in mind that requires only the 32-bit sub-permutation from AES [x86; AESENC] (but skip shift rows step) but it turns out that the transposition step to undo shift rows (x86; ...
user874845643's user avatar
0 votes
0 answers
27 views

This is for understanding when the bound the birthday bound applies in block cipher modes. Suppose that $E(K, X)$/$D(K, X)$ is a block cipher. $T=T_0||T_1||T_2||T_3$ is a tweak value that is twice the ...
Melab's user avatar
  • 4,328
1 vote
0 answers
65 views

What is the point of having dedicated tweakable block ciphers in lieu of XEX which does the same? Does this have something to do with why no one uses XEX with a simple counter? The tweak schedule is ...
Amanda Lars's user avatar
1 vote
0 answers
41 views

I understand the operational mechanisms of Duplex construction and tweakable Authenticated Encryption as used in AEAD schemes. I am interested in a comparative analysis of these cryptographic ...
hardyrama's user avatar
  • 2,318
0 votes
0 answers
50 views

I have a functioning implementation of the NIST SPECK block cipher that I wish to modify to support a tweak. While I am aware that there are a number of papers proposing secure methods of turning a ...
cookiecipher's user avatar
3 votes
2 answers
194 views

I have been doing research on a tweakable block cipher called BipBip. This is a rather niche cipher so I'll give a few facts about it for background before asking my question: The structure is based ...
Tw1ZZLER's user avatar
3 votes
1 answer
172 views

The Threefish tweak block cipher has a fixed size tweak (128 bits) and three different possible key/block sizes (256/512/1024 bits). The MCOE on-line authenticated encryption mode presents three ...
cookiecipher's user avatar
1 vote
1 answer
95 views

The MCOE mode provides a really nice way to implement a nonce-misuse resistant AEAD and is based on an arbitrary tweak block cipher. A specific requirement of the tweak block cipher is that the data ...
cookiecipher's user avatar
3 votes
1 answer
333 views

ChaCha has clear delineations between key, nonce, counter and constants. What is the reason for not using a XEX-like ($k=0$) approach such that the ChaCha key is 512 bits and all the other things are ...
Loraine Toorla's user avatar
2 votes
1 answer
155 views

Let's say I have a block cipher $E: K \times M \rightarrow C$. Is the function defined by $\operatorname{Enc}(k_1,k_2,m) = E(k_1, m)\ \operatorname{XOR}\ E(k_2,m)$ guaranteed to have an inverse ...
user106382's user avatar
1 vote
0 answers
150 views

I want to prove the security of a Tweakable Block Cipher in CBC Mode How does one prove the security of a Tweakable block cipher (ie Threefish) in CBC mode with a random IV and a constant (public) ...
Ant.Ger's user avatar
  • 51
2 votes
0 answers
81 views

In the LRW mode discussion on page 34/161 of the LibTomCrypt manual, available here for example https://opensource.apple.com/source/CommonCrypto/CommonCrypto-55010/Source/libtomcrypt/doc/...
Ant.Ger's user avatar
  • 51
3 votes
1 answer
140 views

The paper https://eprint.iacr.org/2020/986.pdf proposed a framework for embedding a malicious backdoor in LowMC cipher, that will later help the designer to recover the secret key in the known-...
Eddy's user avatar
  • 31

15 30 50 per page