Authenticated encryption mode for beyond the birthday bound security

被引:0
|
作者
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Dept Comp Sci & Engn, Chikusa Ku, Furo, Nagoya 4648603, Japan
来源
关键词
blockcipher; modes of operation; authenticated encryption; security proofs; birthday bound;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose an authenticated encryption mode for blockciphers. Our authenticated encryption mode, CIP, has provable security bounds which are better than the usual birthday bound security. Besides, the proven security bound for authenticity of CIP is better than any of the previously known schemes. The design is based on the encrypt-then-PRF approach, where the encryption part uses a key stream generation of CENC, and the PRF part combines a hash function based on the inner product and a blockcipher.
引用
收藏
页码:125 / +
页数:4
相关论文
共 50 条
  • [31] Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 85 - 104
  • [32] A fundamental flaw in the ++AE authenticated encryption mode
    Al Mahri, Hassan Qahur
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Wong, Kenneth Koon-Ho
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2018, 12 (01) : 37 - 42
  • [33] Attacks on the Authenticated Encryption Mode of Operation PAE
    Chakraborty, Debrup
    Nandi, Mridul
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (10) : 5636 - 5642
  • [34] The mF mode of authenticated encryption with associated data
    Chakraborty, Bishwajit
    Nandi, Mridul
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2022, 16 (01) : 73 - 97
  • [35] MGM beyond the birthday bound
    Kurochkin, Alexey
    Fomin, Denis
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (02) : 231 - 235
  • [36] MGM beyond the birthday bound
    Alexey Kurochkin
    Denis Fomin
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 231 - 235
  • [37] Provable-security analysis of authenticated encryption in Kerberos
    Boldyreva, A.
    Kumar, V.
    IET INFORMATION SECURITY, 2011, 5 (04) : 207 - 219
  • [38] Security notes on generalization of threshold signature and authenticated encryption
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (12): : 3443 - 3446
  • [39] Security notes on generalization of threshold signature and authenticated encryption
    Wang, Shuhong
    Wang, Guilin
    Bao, Feng
    Wang, Jie
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2004, E87-A (12) : 3443 - 3446
  • [40] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666