Document Type : Research Paper

Authors

1 College of Computer, Al-Anbar University, Iraq

2 College of Science, Al-Anbar University, Iraq

10.37652/juaps.2010.15401

Abstract

There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or byte (sometimes even one 32-bit word) at a time. The Block cipher modes of operation can be applied as both stream and block cipher.In this paper we introduce three developments of Counter Mode of Operation of Block cipher. These developments merge between advantages of Counter Mode with other Modes. This gives a good secure Modes for General purpose block-oriented transmission Authentication, Random access, Stream-oriented transmission over noisy channel.

Keywords

[1] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, New York, 2nd edition, 1996.
[2] W. Stallings, Cryptography and Network Security, Principle and Practice, Addison Wesley, 2004.
[3] B. Preneel, M. Nuttin, V. Rijmen, and J. Buelens, “Cryptanalysis of the CFB mode of the DES with a Reduced Number of Rounds,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 212–223.
[4] C. M. Campbell, “Design and Specification of Cryptographic Capabilities,” IEEE Computer Society Magazine, v. 16, n. 6, Nov 1978, pp. 15–19.
[5] S.T. Kent, “Encryption–Based Protection Protocols for Interactive User–Computer Communications,” MIT/LCS/TR–162, MIT Laboratory for Computer Science, May 1976.
[6] W. Diffie and M.E. Hellman, “Privacy and Authentication: An Introduction to Cryptography,” Proceedings of the IEEE, v. 67, n. 3, Mar 1979, pp. 397–427.
[7] T. Herlestam, “Critical Remarks on Some Public–Key Cryptosystems,” BIT, v. 18, 1978, pp. 493–496.
[8] Lipmaa, H.; Rogaway, P.; and Wagner, D. "CTR Mode Encryption." NIST First Modes of Operation Workshop, October 2000. http://csrc.nist.gov/encryption/modes
[9] Alan G. Konheim, Computer Security
And Cryptography, John Wiley & Sons Inc., 2007.
[10] Voydock, V., and Kent., S. "Security Mechanisms in High-Level Network Protocols." Computing Surveys, June 1983.
[11] M. Stamp, Information Security Principles and practice, JohnWiley & Sons, Inc., 2006.