Authenticated encryption mode for beyond the birthday bound security

被引:0
|
作者
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Dept Comp Sci & Engn, Chikusa Ku, Furo, Nagoya 4648603, Japan
来源
关键词
blockcipher; modes of operation; authenticated encryption; security proofs; birthday bound;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose an authenticated encryption mode for blockciphers. Our authenticated encryption mode, CIP, has provable security bounds which are better than the usual birthday bound security. Besides, the proven security bound for authenticity of CIP is better than any of the previously known schemes. The design is based on the encrypt-then-PRF approach, where the encryption part uses a key stream generation of CENC, and the PRF part combines a hash function based on the inner product and a blockcipher.
引用
收藏
页码:125 / +
页数:4
相关论文
共 50 条
  • [41] On the Security of Sponge-type Authenticated Encryption Modes
    Chakraborty, Bishwajit
    Jha, Ashwin
    Nandi, Mridul
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 93 - 119
  • [42] Comments on the security of Chen's authenticated encryption scheme
    Rasslan, Mohamed
    Youssef, Amr
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (01) : 71 - 74
  • [43] The security of the improvement on the generalization of threshold signature and authenticated encryption
    Lee, NY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (10) : 2364 - 2367
  • [44] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [45] OMD: A Compression Function Mode of Operation for Authenticated Encryption
    Cogliani, Simon
    Maimut, Diana-Stefania
    Naccache, David
    do Canto, Rodrigo Portella
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizar, Damian
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 112 - 128
  • [46] Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 705 - 735
  • [47] ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
    Chakraborti, Avik
    Datta, Nilanjan
    Jha, Ashwin
    Mancillas-Lopez, Cuauhtemoc
    Nandi, Mridul
    Sasaki, Yu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 350 - 389
  • [48] One-Key Compression Function Based MAC with Security Beyond Birthday Bound
    Dutta, Avijit
    Nandi, Mridul
    Paul, Goutam
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 343 - 358
  • [49] Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
    Shenets, N. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 857 - 864
  • [50] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104