Authenticated encryption mode for beyond the birthday bound security

被引:0
|
作者
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Dept Comp Sci & Engn, Chikusa Ku, Furo, Nagoya 4648603, Japan
来源
关键词
blockcipher; modes of operation; authenticated encryption; security proofs; birthday bound;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose an authenticated encryption mode for blockciphers. Our authenticated encryption mode, CIP, has provable security bounds which are better than the usual birthday bound security. Besides, the proven security bound for authenticity of CIP is better than any of the previously known schemes. The design is based on the encrypt-then-PRF approach, where the encryption part uses a key stream generation of CENC, and the PRF part combines a hash function based on the inner product and a blockcipher.
引用
收藏
页码:125 / +
页数:4
相关论文
共 50 条
  • [1] Efficient beyond-birthday-bound secure authenticated encryption modes
    Ping ZHANG
    Honggang HU
    Peng WANG
    ScienceChina(InformationSciences), 2018, 61 (09) : 285 - 296
  • [2] Efficient beyond-birthday-bound secure authenticated encryption modes
    Ping Zhang
    Honggang Hu
    Peng Wang
    Science China Information Sciences, 2018, 61
  • [3] Efficient beyond-birthday-bound secure authenticated encryption modes
    Zhang, Ping
    Hu, Honggang
    Wang, Peng
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (09)
  • [4] XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation
    Bao, Zhenzhen
    Hwang, Seongha
    Inoue, Akiko
    Lee, Byeonghak
    Lee, Jooyoung
    Minematsu, Kazuhiko
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 532 - 561
  • [5] Security of the Misty Structure beyond the Birthday Bound
    Lee, Jooyoung
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (07) : 1516 - 1522
  • [6] Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
    Andreeva, Elena
    Bhati, Amit Singh
    Vizar, Damian
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 512 - 534
  • [7] Multi-User Security of CCM Authenticated Encryption Mode
    Zhang, Xiangyang
    Shen, Yaobin
    Wang, Lei
    PROCEEDINGS OF THE 2024 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2024, 2024, : 4331 - 4345
  • [8] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    Sasaki, Yu
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2019, 32 (03) : 895 - 940
  • [9] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Philipp Jovanovic
    Atul Luykx
    Bart Mennink
    Yu Sasaki
    Kan Yasuda
    Journal of Cryptology, 2019, 32 : 895 - 940
  • [10] On the security of a convertible authenticated encryption
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1063 - 1069