Have a question or want to start a discussion? Post it! No Registration Necessary. Now with pictures!
- Mok-Kong Shen
May 1, 2015, 8:37 pm
rate this thread
The implementation of AES in this software follows the pseudo-code
in FIPS-197 very closely and neglects all feasible optimization
tricks so as to maximize the readability and hence ease of
verification which is obviously very essential for gaining users'
trust nowadays in any IT-security software in general.
The softwaare also includes a function to generate pseudo-random
byte sequences with AES in counter mode and a function to encrypt
an arbitrarily long 16-byte block sequence according to PCBC
(block-chaining), paired with a function to decrypt.
PCBC works analogously to CBC with the difference that, instead
of employing the ciphertext of the immediately previous block to
xor with the plaintext of the current block, one employs a certain
suitable (nonlinear) accumulated value of all previous plaintext
and ciphertext blocks. Since at the end of processing the last
chaining value can be used as a superior integrity check, PCBC is
a one-pass encryption processing with integrity check.
The software is available at:
M. K. Shen
- » Simple feasibility of embedding a back door into a proprietary software for RSA key genera...
- — Next thread in » Networking Firewalls
- » RANDOMPREFIX, an encryption scheme based on dynamic bytes substitution and pseudo-random p...
- — Previous thread in » Networking Firewalls
- » CFP: The 24th European Symposium on Research in Computer Security (ESORICS 2019...
- — Newest thread in » Networking Firewalls
- » History 1957 dial upgrade [telecom]
- — The site's Newest Thread. Posted in » General Telecommunications Forum
- » Re: [telecom] Ajit Pai proposes new rule that would allow carriers to block r...
- — The site's Last Updated Thread. Posted in » General Telecommunications Forum