Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

CWC mode

From Wikipedia, the free encyclopedia
Authenticated encryption mode for block ciphers
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "CWC mode" – news ·newspapers ·books ·scholar ·JSTOR
(April 2019) (Learn how and when to remove this message)

Incryptography,CWC Mode (Carter–Wegman +CTR mode) is anAEAD block cipher mode of operation that provides both encryption and built-in message integrity, similar to CCM and OCB modes. It combines the use of CTR mode with a 128-bit block cipher for encryption with an efficient polynomialCarter–Wegman MAC with a tag length of at most 128 bits and is designed byTadayoshi Kohno,John Viega andDoug Whiting.[1]

CWC mode was submitted toNIST[2] for standardization, but NIST opted for the similarGCM mode instead.[3]

Although GCM has weaknesses compared to CWC,[4] the GCM authors successfully argued for GCM.[5]

CWC allows the payload and associated data to be at most 232 - 1 blocks or nearly 550 GB.[1]

References

[edit]
  1. ^abKohno, Tadayoshi; Viega, John; Whiting, Doug (2004)."CWC: A High-Performance Conventional Authenticated Encryption Mode".Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 408–426.doi:10.1007/978-3-540-25937-4_26.ISBN 9783540259374.
  2. ^"NIST.gov - Computer Security Division - Computer Security Resource Center". August 30, 2017. Archived fromthe original on 2017-08-30.
  3. ^"Modes Development - Block Cipher Techniques | CSRC | CSRC". 4 January 2017.
  4. ^"Authentication weaknesses in GCM"(PDF). 2005-05-20.
  5. ^"GCM Update"(PDF). May 31, 2005.

External links

[edit]
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics


Stub icon

This cryptography-related article is astub. You can help Wikipedia byexpanding it.

Retrieved from "https://en.wikipedia.org/w/index.php?title=CWC_mode&oldid=1270070062"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp