CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Comparative Study of RKC and GCM Mode of Operation

by Puneet Kumar Kaushal, Rajeev Sobti, Ranjana Singh Rathore
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 9
Year of Publication: 2012
Authors: Puneet Kumar Kaushal, Rajeev Sobti, Ranjana Singh Rathore
10.5120/8232-1323

Puneet Kumar Kaushal, Rajeev Sobti, Ranjana Singh Rathore . Comparative Study of RKC and GCM Mode of Operation. International Journal of Computer Applications. 52, 9 ( August 2012), 30-33. DOI=10.5120/8232-1323

@article{ 10.5120/8232-1323,
author = { Puneet Kumar Kaushal, Rajeev Sobti, Ranjana Singh Rathore },
title = { Comparative Study of RKC and GCM Mode of Operation },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 9 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number9/8232-1323/ },
doi = { 10.5120/8232-1323 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:51.453927+05:30
%A Puneet Kumar Kaushal
%A Rajeev Sobti
%A Ranjana Singh Rathore
%T Comparative Study of RKC and GCM Mode of Operation
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 9
%P 30-33
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the race of designing an efficient 'Authenticated Encryption (AE) mode of operation' several efforts have been done over past few years. In practical, when we have to send any data, we also need integrity and authentication along with the encrypted message. These requirements in real world prioritize Authenticated Encryption, in spite of using encryption and authentication schemes separately. In an AE scheme the parts responsible for authentication and privacy are tightly coupled so that they can work efficiently. The other reason for using AE scheme is that an AE scheme is less likely to be used incorrectly than the combination of two different schemes. In this paper comparative study of two prominent Authenticated Encryption modes (RKC and GCM) is done that are free from any intellectual property claims.

References
  1. Rogaway, P. , Bellare, M. , Black, J. , Krovetz, T. , Aug 3, 2001, OCB: A Block Cipher Mode of Operation for Efficient Authenticated Encryption.
  2. McGrew, D. A. , Viega, J. , June 2005, Galois/CTR Mode of Operation, Table 3, pp. 21.
  3. Krovetz T. , Rogaway P. , March 21, 2011, the Software Performance of Authenticated Encryption Modes, pp. 9-11.
  4. McGrew, D. A. , Viega, J. , June 2005, Galois/CTR Mode of Operation.
  5. Kaushal, P. , Sobti, R. , Geetha, G. , Feb 2012, Random Key Chaining (RKC): AES Mode of Operation, International Journal of Applied Information Systems, Volume 1, Number 5.
  6. Salowey, J. , Choudhury, A. , McGrew, D. , August 2008, AES Galois Counter Mode (GCM) Cipher Suites for TLS, RFC 5288.
  7. McGrew, D. , Viega, J. , May 2006, Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH, McAfee, Inc. , RFC 4543.
  8. Institute of Electrical and Electronics Engineers. IEEE Std. 802. 1AE-2006, IEEE Standard for local and metropolitan area networks – Media Access Control (MAC) security. IEEE Press, 2006.
  9. Gopal, V. , Ozturk, E. , Feghali, W. , Guilford, J. , Wolrich, G. , Dixon, M. , August 2010, Optimized Galois-Counter-Mode Implementation on Intel Architecture Processors,Intel Corporation.
  10. Furguson, N. , May 20, 2005, Authentication Weakness in GCM.
  11. Furguson, N. , May 20, 2005, Authentication Weakness in GCM, pp. 7-8.
  12. Dworkin, M. NIST Special Publication 800-38D. Recommendation for block cipher modes of operation: Galois/Counter Mode (GCM and GMAC), Nov. 2007.
  13. Barker, E. , Kelsey, J. , Recommendation for Random Number Generation Using Deterministic Random Bit Generators, March 2007, revised May 2011, NIST Special Publication 800-90, pp. 34-38.
  14. Announcing Secure Hash Standard, Federal Information Processing Standards Publication, FIPS 180-2, Aug 1, 2002, pp. 18-19, 33-40.
Index Terms

Computer Science
Information Sciences

Keywords

Random Key Chainingmode (RKC) Galois/Counter mode(GCM) Comparison Authenticated encryption mode