The FCM Scheme for Authenticated Encryption

被引:0
|
作者
Lei, Xiaomei [1 ]
Wu, Zhongdong [1 ]
Yong, Jiu [1 ]
机构
[1] Lanzhou Jiaotong Univ, Sch Elect & Informat Engn, Lanzhou 730070, Gansu, Peoples R China
关键词
Authenticated encryption; compression function; FMAC; Galois/Counter Mode;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We propose an advanced authenticated encryption with associated data (AEAD) scheme called FCM (compression Function/Counter Mode) based on a compression function required to be a pseudorandom function (PRF) against related key attacks. FCM adopts the stream cipher generated by parallel compression function to encrypt plaintexts, and then utilizes compression Function-based MAC (FMAC) to produce the authentication tag, in which FMAC is a variant of the Merkle-Damgard construction with a permutation. In this structure, FCM successfully avoids introducing the string representing lengths of plaintext and associated data in the generation of the authentication tag, which is a shortage in Galois/Counter Mode (GCM) especially for short message. Then we analyze the security of FCM from two aspects of encryption and authentication based on secure underlying primitives. At last features of FCM are summarized and compared with GCM.
引用
收藏
页码:1123 / 1129
页数:7
相关论文
共 50 条
  • [21] An Efficient Scheme of Authenticated Encryption with Associated Data
    Zhang, Shaolan
    Xing, Guobo
    Yang, Yixian
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 4217 - +
  • [22] Robust authenticated encryption scheme with message linkages
    Yoon, EJ
    Yoo, KY
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS, 2005, 3684 : 281 - 288
  • [23] TriviA: A Fast and Secure Authenticated Encryption Scheme
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 330 - 353
  • [24] Analysis of Authenticated Encryption Scheme for Wireless Sensor Networks
    Siddiqui, Adeel Ahmed
    Pirzada, Syed Jahanzeb Hussain
    2013 INTERNATIONAL CONFERENCE ON AEROSPACE SCIENCE & ENGINEERING (ICASE), 2013, : 27 - 30
  • [25] Authenticated encryption scheme with (t, n) shared verification
    Hsu, CL
    Wu, TC
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 117 - 120
  • [26] EnCash: An Authenticated Encryption Scheme Using Cellular Automata
    Banerjee, Tapadyoti
    Chowdhury, Dipanwita Roy
    JOURNAL OF CELLULAR AUTOMATA, 2022, 16 (5-6) : 443 - 461
  • [27] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [28] Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
    Agrawal, Megha
    Chang, Donghoon
    Kang, Jinkeon
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 22
  • [29] Impossible differential cryptanalysis of the Gimli authenticated encryption scheme
    Tan H.
    Shen B.
    Miao X.
    Zhang W.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (05): : 213 - 220
  • [30] A publicly verifiable authenticated encryption scheme with message linkages
    Peng, YQ
    Xie, SY
    Chen, YF
    Deng, R
    Peng, LX
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1271 - 1276