Redefining GCM’s resistance to cryptanalysis with offset mechanisms
Main Article Content
Abstract
The research paper proposes an enhancement to the Galois/Counter Mode (GCM) of authenticated encryption by introducing an “offset” mechanism. This modification aims to improve privacy and resist differential cryptanalysis without significantly impacting the mode’s efficiency and simplicity. The improved GCM maintains its original features, such as minimal block cipher invocations, the use of a single cryptographic key, and efficient offset computation. It provides a detailed analysis of the operational framework, including the integration and calculation of offsets in encryption and decryption processes. By complicating the predictability of differential cryptanalysis through unique offsets, the paper asserts this enhancement significantly increases GCM’s security within a concrete security model. The discussion emphasizes the benefits of the offset-enhanced GCM over other modes, highlighting its suitability for high-speed, parallelizable cryptographic applications while bolstering resistance against cryptanalytic attacks.
Downloads
Article Details
Copyright (c) 2024 Nawaz MF, et al.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Rogaway P. Evaluation of some blockcipher modes of operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan. 2011.
Bellare M, Rogaway P, Wagner D. A conventional authenticated-encryption mode. Manuscript. 2003.
Švenda P. Basic comparison of Modes for Authenticated-Encryption (IAPM, XCBC, OCB, CCM, EAX, cwc, GCM, PCFB, CS).
Jutla CS. Parallelizable encryption mode with almost free message integrity. Contribution to NIST. 2000.
Rogaway PM. Bellare, and J. Black, OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC). 2003; 6(3): 365-403.
Krovetz T, Rogaway P. The OCB authenticated-encryption algorithm. 2014.
Rogaway P. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. in International Conference on the Theory and Application of Cryptology and Information Security. 2004. Springer.
Krovetz T, Rogaway P. The software performance of authenticated-encryption modes. in International Workshop on Fast Software Encryption. 2011. Springer.
Black J, Rogaway P. A block-cipher mode of operation for parallelizable message authentication. In International Conference on the Theory and Applications of Cryptographic Techniques. 2002. Springer.
Iwata T. New blockcipher modes of operation with beyond the birthday bound security. In International Workshop on Fast Software Encryption. 2006. Springer.
Dworkin M. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality. 2004. National Institute of Standards and Technology.
Iwata T, Kurosawa K. Omac: One-key cbc mac. In International Workshop on Fast Software Encryption. 2003. Springer.
Wegman MN, Carter JL. New hash functions and their use in authentication and set equality. Journal of computer and system sciences. 1981; 22(3): 265-279.
Kohno T, Viega J, Whiting D. The cwc authenticated encryption (associated data) mode. ePrint Archives. 2003.
Rogaway P. Authenticated-encryption with associated-data. in Proceedings of the 9th ACM conference on Computer and communications security. 2002. ACM.
Szalachowski P, Ksiezopolski B, Kotulski Z. CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks. Information Processing Letters. 2010; 110(7): 247-251.
Housley R. Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS). 2007.
Hiller J. Improving functionality, efficiency, and trustworthiness of secure communication on an internet diversified by mobile devices and the internet of things. 2023, Dissertation, RWTH Aachen University, 2022.
McGrew D, Viega J. The Galois/counter mode of operation (GCM). Submission to NIST Modes of Operation Process. 2004; 20.
Miao X. Bit-Sliced Implementation of SM4 and New Performance Records. 2023.
Lipmaa H, Rogaway P, Wagner D. CTR-mode encryption. In First NIST Workshop on Modes of Operation. 2000. Citeseer.
McGrew DA. Counter mode security: Analysis and recommendations. Cisco Systems. 2002; 2(4).
Gueron S, Jha A, Nandi M. COMET: COunter Mode Encryption with authentication Tag. 2019.
Saarinen MJO. Cycling attacks on GCM, GHASH and other polynomial MACs and hashes. In International Workshop on Fast Software Encryption. 2012. Springer.
Lipmaa H, Wagner D, Rogaway P. Comments to NIST concerning AES modes of operation: CTR-mode encryption. 2000.
Gligor VD, Donescu P. Fast encryption and authentication: XCBC encryption and XECB authentication modes. in International Workshop on Fast Software Encryption. 2001. Springer.
Jutla CS. Encryption modes with almost free message integrity. In International Conference on the Theory and Applications of Cryptographic Techniques. 2001. Springer.
Benvenuto CJ. Galois field in cryptography. University of Washington. 2012.
Aljohani M. Performance Analysis of Cryptographic Pseudorandom Number Generators. IEEE Access. 2019; 7: 39794-39805.
Bellare M. A concrete security treatment of symmetric encryption. In Proceedings 38th Annual Symposium on Foundations of Computer Science. 1997. IEEE.
Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences. 2000; 61(3): 362-399.
Goldreich O, Goldwasser S, Micali S. How to construct random functions. Journal of the ACM (JACM). 1986; 33(4): 792-807.