International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 52 - Number 9 |
Year of Publication: 2012 |
Authors: Puneet Kumar Kaushal, Rajeev Sobti, Ranjana Singh Rathore |
10.5120/8232-1323 |
Puneet Kumar Kaushal, Rajeev Sobti, Ranjana Singh Rathore . Comparative Study of RKC and GCM Mode of Operation. International Journal of Computer Applications. 52, 9 ( August 2012), 30-33. DOI=10.5120/8232-1323
In the race of designing an efficient 'Authenticated Encryption (AE) mode of operation' several efforts have been done over past few years. In practical, when we have to send any data, we also need integrity and authentication along with the encrypted message. These requirements in real world prioritize Authenticated Encryption, in spite of using encryption and authentication schemes separately. In an AE scheme the parts responsible for authentication and privacy are tightly coupled so that they can work efficiently. The other reason for using AE scheme is that an AE scheme is less likely to be used incorrectly than the combination of two different schemes. In this paper comparative study of two prominent Authenticated Encryption modes (RKC and GCM) is done that are free from any intellectual property claims.