DocumentCode :
3157269
Title :
Conversion and proxy functions for symmetric key ciphers
Author :
Cool, D.L. ; Keromytis, Angelos D.
Author_Institution :
Dept. of Comput. Sci., Columbia Univ., New York, NY, USA
Volume :
1
fYear :
2005
fDate :
4-6 April 2005
Firstpage :
662
Abstract :
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are scenarios in which this property is desirable and can be obtained without reducing the security of a cipher by increasing the computational workload of the cipher. We expand the idea of a symmetric key cipher being closed under functional composition to a more general scenario where there exists a function that converts the ciphertext resulting from encryption under a specific key to the ciphertext corresponding to encryption with another key. We show how to perform such a conversion without exposing the plaintext. We discuss the tradeoff between the computational workload and security, and the relationship between such conversions and proxy cryptography. We conclude with a description of some practical applications of our results.
Keywords :
cryptography; cipher security; ciphertext; computational workload; data security; encryption; functional composition; proxy cryptography; proxy functions; public key cryptography; symmetric key ciphers; Computer science; Computer security; Information security; Inspection; Public key; Public key cryptography; Virtual private networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on
Print_ISBN :
0-7695-2315-3
Type :
conf
DOI :
10.1109/ITCC.2005.115
Filename :
1428539
Link To Document :
بازگشت