Skip to main content

Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers

  • Book
  • © 2022

Overview

  • Presents the treatment of tweakable block cipher-based cryptographic algorithms with focus on hardware implementations
  • Provides details of the design processes some of the tweakable block cipher-based authenticated encryption algorithms
  • Exhibits simple language suitable for engineers and implementers without intensive cryptographic background

Part of the book series: Computer Architecture and Design Methodologies (CADM)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (9 chapters)

Keywords

About this book

This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.

Authors and Affiliations

  • Nanyang Technological University, Singapore, Singapore

    Mustafa Khairallah

Bibliographic Information

  • Book Title: Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers

  • Authors: Mustafa Khairallah

  • Series Title: Computer Architecture and Design Methodologies

  • DOI: https://doi.org/10.1007/978-981-16-6344-4

  • Publisher: Springer Singapore

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022

  • Hardcover ISBN: 978-981-16-6343-7Published: 17 November 2021

  • Softcover ISBN: 978-981-16-6346-8Published: 18 November 2022

  • eBook ISBN: 978-981-16-6344-4Published: 17 November 2021

  • Series ISSN: 2367-3478

  • Series E-ISSN: 2367-3486

  • Edition Number: 1

  • Number of Pages: XVIII, 192

  • Number of Illustrations: 27 b/w illustrations, 110 illustrations in colour

  • Topics: Circuits and Systems, Systems and Data Security, Security Science and Technology

Publish with us