Authenticated Encryption Based on Finite Automata Cryptosystems

被引:0
|
作者
Salas Pena, Pedro Ivan [1 ]
Gonzalez Torres, Raul Ernesto [1 ]
机构
[1] CINVESTAV Guadalajara, Comp Sci, Zapopan, Jalisco, Mexico
关键词
Authenticated Encryption; Cryptography with Finite Automata; FASKC; MAC; Cryptographic Boolean Functions;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new Authenticated Encryption (AE) scheme based on finite automata using the method Encrypt-then-MAC. The scheme is constructed from two cryptographic primitives, a symmetric encryption scheme based on finite automata known as FASKC and a Message Authentication Code (MAC) constructed from a finite automaton. The paper shows how the scheme works and how to construct a MAC from a finite automaton using a boolean function with good cryptographic properties. Due to the construction method and the assumption that the symmetric encryption scheme is secure under Chosen Plaintext Attack (CPA), it is shown that the MAC is unforgeable under Chosen Message Attack (UF-CMA) making the scheme secure under Chosen Ciphertext Attack (CCA).
引用
收藏
页数:6
相关论文
共 50 条
  • [31] PAEQ: Parallelizable permutation-based authenticated encryption
    Biryukov, Alex (alex.biryukov@uni.lu), 1600, Springer Verlag (8783):
  • [32] ON CRYPTOSYSTEMS BASED ON POLYNOMIALS AND FINITE-FIELDS
    LIDL, R
    LECTURE NOTES IN COMPUTER SCIENCE, 1985, 209 : 10 - 15
  • [33] Cryptosystems based on polynomials over finite fields
    Okamoto, E
    PROCEEDINGS OF 2002 IEEE INFORMATION THEORY WORKSHOP, 2002, : 74 - 77
  • [34] A new encryption algorithm for image cryptosystems
    Chang, CC
    Hwang, MS
    Chen, TS
    JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) : 83 - 91
  • [35] AN AUTHENTICATED PAYWORD SCHEME WITHOUT PUBLIC KEY CRYPTOSYSTEMS
    Wu, Chia-Chi
    Chang, Chin-Chen
    Lin, Iuon-Chang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (09): : 2881 - 2891
  • [36] Publicly verifiable authenticated encryption
    Ma, CS
    Chen, KF
    ELECTRONICS LETTERS, 2003, 39 (03) : 281 - 282
  • [37] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [38] Authenticated Encryption with Variable Stretch
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizar, Damian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 396 - 425
  • [39] Unconditionally secure authenticated encryption
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Matsumoto, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1119 - 1131
  • [40] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309