Date Published: April 2025
Author(s)
Yu Long Chen (NIST), Michael Davidson (NIST), Morris Dworkin (NIST), John Kelsey (NIST), Yu Sasaki (NIST), Meltem Sönmez Turan (NIST), Donghoon Chang (Strativia), Nicky Mouha (FWI), Alyssa Thompson (NSA)
This report introduces the cryptographic accordion as a tweakable, variable-input-length strong pseudorandom permutation (VIL-SPRP) that is constructed from an underlying block cipher. An accordion facilitates the cryptographic processing of messages of various sizes while offering enhanced security compared to the approved block cipher modes of operation that are specified in the NIST SP 800-38 series. This report introduces associated terminology, outlines design requirements for accordions, and describes three categories of applications for them.
This report introduces the cryptographic accordion as a tweakable, variable-input-length strong pseudorandom permutation (VIL-SPRP) that is constructed from an underlying block cipher. An accordion facilitates the cryptographic processing of messages of various sizes while offering enhanced security...
See full abstract
This report introduces the cryptographic accordion as a tweakable, variable-input-length strong pseudorandom permutation (VIL-SPRP) that is constructed from an underlying block cipher. An accordion facilitates the cryptographic processing of messages of various sizes while offering enhanced security compared to the approved block cipher modes of operation that are specified in the NIST SP 800-38 series. This report introduces associated terminology, outlines design requirements for accordions, and describes three categories of applications for them.
Hide full abstract
Keywords
accordion; authenticated encryption; disk encryption; encode-then-encipher; key wrapping; length-preserving encryption
Control Families
None selected