Counter Chain: A New Block Cipher Mode of Operation


Aly Mohamed El-Semary, Mohamed Mostafa A. Azim, , Journal of Information Processing Systems Vol. 11, No. 2, pp. 266-279, Jun. 2015  

https://doi.org/10.3745/JIPS.03.0031
Keywords: authentication, Block Cipher Mode, Confidentiality, Counter Mode, Counter Chain
Fulltext:

Abstract

In this paper, we propose a novel block cipher mode of operation, which is known as the counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining (CBC) block cipher mode of operation with the counter (CTR) mode in a consistent fashion. In the CC mode, the confidentiality and authenticity of data are assured by the CBC mode, while speed is achieved through the CTR mode. The proposed mode of operation overcomes the parallelization deficiency of the CBC mode and the chaining dependency of the counter mode. Experimental results indicate that the proposed CC mode achieves the encryption speed of the CTR mode, which is exceptionally faster than the encryption speed of the CBC mode. Moreover, our proposed CC mode provides better security over the CBC mode. In summary, the proposed CC block cipher mode of operation takes the advantages of both the Counter mode and the CBC mode, while avoiding their shortcomings.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
El-Semary, A., Azim, M., & (2015). Counter Chain: A New Block Cipher Mode of Operation. Journal of Information Processing Systems, 11(2), 266-279. DOI: 10.3745/JIPS.03.0031.

[IEEE Style]
A. M. El-Semary, M. M. A. Azim, , "Counter Chain: A New Block Cipher Mode of Operation," Journal of Information Processing Systems, vol. 11, no. 2, pp. 266-279, 2015. DOI: 10.3745/JIPS.03.0031.

[ACM Style]
Aly Mohamed El-Semary, Mohamed Mostafa A. Azim, and . 2015. Counter Chain: A New Block Cipher Mode of Operation. Journal of Information Processing Systems, 11, 2, (2015), 266-279. DOI: 10.3745/JIPS.03.0031.