HI Arne,
While there can be tweaks, would there be a specific cipher-mode describing such a cipher-mode?
The original paper from Prof. Rogaway is a bit old and from what I see is that it may challenges in terms of real cipher design in a practical world.
1. How does a cipher-mode work in existing networks and protocols?
2. I am not sure of the integrity model and other features for complying to the AEAD requirement of accordion..
It is early to discuss, however, I hope the model of atnaCM provides the proper framework to meet such challenges.
In terms of specification, the Design Summary has the list of specifications at the end with their significance towards the end of the document.. Also, you can read the "Mode Of Operations Abstract" on
https://atnacipher.com. This would really be very helpful as this is my first time submitting to this Forum and can use any guidance to get the right information to get it selected (if acceptable.)
This might give you more on the design goals of "atnaCM" cipher-mode and personally there will be applications that work better in each specific mode and hopefully can coexist off this effort similar to SP800-38A
Please let me know if there are questions.
Thx.,
Tushar