IEEE Std 1619.1-2018 pdf download – IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

02-24-2022 comment

IEEE Std 1619.1-2018 pdf download – IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices.
cryptographic unit: Any set of software, frmware, or hardware that can perform a cryptographic operation. decryption: The act of producing plaintext from ciphertext. Contrast: encryption. See also: plaintext; ciphertext; cryptographic key; cryptographic mode of operation. decryption routine: An instantiation of a cryptographic mode of operation that converts ciphertext into plaintext. encrypted record: A collection of felds that includes the output of an encryption operation or authentication operation (e.g., ciphertext, message authentication code), and optionally contains other information needed for a subsequent decryption operation (e.g., additional authenticated data, initialization vector). See also: ciphertext; initialization vector; message authentication code; additional authenticated data. encryption: The act of producing ciphertext from plaintext. Contrast: decryption. See also: plaintext; ciphertext; cryptographic key; cryptographic mode of operation. encryption routine: An instantiation of a cryptographic mode of operation that converts plaintext into ciphertext. encryption session: An interval in which a cryptographic unit generates encrypted records using a set of self-consistent variables, such as unique initialization vectors. See also: encryption; initialization vector; cryptographic unit. NOTE—See 6.5.3. Galois/Counter Mode (GCM): A cryptographic mode of operation that provides confdentiality through counter mode encryption and integrity through a message authentication code that uses Galois feld arithmetic (see McGrew and Viega, The Galois/Counter Mode of Operation).
nonce: A bit string that has a low probability of matching any other nonce in a particular context. See also: initialization vector. plaintext: Information that has not been obscured through a cryptographic transformation. Contrast: ciphertext. plaintext record: A string of plaintext passed to an encryption routine to produce a same-length ciphertext record. See also: plaintext; cryptographic unit; encryption; encrypted record; host record. policies: In cryptography, a set of rules that defnes aspects of the management of a cryptographic system (e.g., encryption, decryption, or bypass rules). random bit generator (RBG): See: cryptographically-sound random-bit generator. random nonce: A nonce that completely consists of the output from a random bit generator. See also: nonce; cryptographically-sound random-bit generator. Secure Hash Algorithm (SHA): A family of cryptographic hash functions defned by NIST FIPS 180-2. See also: cryptographic hash function.. self-contained group: A set of cryptographic units that generate and use IVs in a consistent manner. Xor-encrypt-xor with tweak and ciphertext stealing (XTS): The cryptographic mode of operation described in IEEE Std 1619™. NOTE—See 6.6.

Download infomation Go to download
Note: If you can share this website on your Facebook,Twitter or others,I will share more.

LEAVE A REPLY

Anonymous netizen Fill in information