Authenticated Encryption Based on Finite Automata Cryptosystems

被引:0
|
作者
Salas Pena, Pedro Ivan [1 ]
Gonzalez Torres, Raul Ernesto [1 ]
机构
[1] CINVESTAV Guadalajara, Comp Sci, Zapopan, Jalisco, Mexico
关键词
Authenticated Encryption; Cryptography with Finite Automata; FASKC; MAC; Cryptographic Boolean Functions;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new Authenticated Encryption (AE) scheme based on finite automata using the method Encrypt-then-MAC. The scheme is constructed from two cryptographic primitives, a symmetric encryption scheme based on finite automata known as FASKC and a Message Authentication Code (MAC) constructed from a finite automaton. The paper shows how the scheme works and how to construct a MAC from a finite automaton using a boolean function with good cryptographic properties. Due to the construction method and the assumption that the symmetric encryption scheme is secure under Chosen Plaintext Attack (CPA), it is shown that the MAC is unforgeable under Chosen Message Attack (UF-CMA) making the scheme secure under Chosen Ciphertext Attack (CCA).
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Quantum multiparty cryptosystems based on a homomorphic random basis encryption
    Changbin Lu
    Fuyou Miao
    Junpeng Hou
    Zhaofeng Su
    Yan Xiong
    Quantum Information Processing, 2020, 19
  • [22] Identity-based authenticated encryption with identity confidentiality
    Shen, Shiyu
    Wang, Hongbing
    Zhao, Yunlei
    THEORETICAL COMPUTER SCIENCE, 2022, 901 : 1 - 18
  • [23] Integrity analysis of authenticated encryption based on stream ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) : 493 - 511
  • [24] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [25] Integrity analysis of authenticated encryption based on stream ciphers
    Kazuya Imamura
    Kazuhiko Minematsu
    Tetsu Iwata
    International Journal of Information Security, 2018, 17 : 493 - 511
  • [26] ALE: AES-Based Lightweight Authenticated Encryption
    Bogdanov, Andrey
    Mendel, Florian
    Regazzoni, Francesco
    Rijmen, Vincent
    Tischhauser, Elmar
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 447 - 466
  • [27] Analysis of Sponge Function Based Authenticated Encryption Schemes
    Krishnan, Lekshmi R.
    Sindhu, M.
    Srinivasan, Chungath
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [28] Identity-Based Authenticated Encryption with Identity Confidentiality
    Zhao, Yunlei
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 633 - 653
  • [29] Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
    Bhargavi, K. V. L.
    Srinivasan, Chungath
    Lakshmy, K., V
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 49 - 70
  • [30] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 257 - 276