摘要 |
A cryptographic technique that provides fast and extremely secure encryption and decryption, assures integrity of a ciphertext message and can be used to generate a message authentication code (MAC). This technique involves, during message encryption: generating, in response to an incoming plaintext message (410), an intermediate stream (420) - such as by chaining the message, wherein a predefined portion of the intermediate stream (422) defines a MAC; an encrypted version (445) of the MAC into a predefined portion of a ciphertext message (451); and generating, in response to the intermediate stream and the encrypted MAC, a remainder of the ciphertext message such that the remainder exhibits a predefined, e.g., pseudo-random, variation which is also contained within the encrypted MAC. By extending a specific pseudo-random sequence, as defined by the encrypted MAC, across the remainder of the ciphertext, any subsequent change to the ciphertext would likely destroy the continuity of this sequence that would otherwise reside throughout the remainder of the ciphertext.
|