Authenticated Encryption Based on Finite Automata Cryptosystems

被引:0
|
作者
Salas Pena, Pedro Ivan [1 ]
Gonzalez Torres, Raul Ernesto [1 ]
机构
[1] CINVESTAV Guadalajara, Comp Sci, Zapopan, Jalisco, Mexico
关键词
Authenticated Encryption; Cryptography with Finite Automata; FASKC; MAC; Cryptographic Boolean Functions;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new Authenticated Encryption (AE) scheme based on finite automata using the method Encrypt-then-MAC. The scheme is constructed from two cryptographic primitives, a symmetric encryption scheme based on finite automata known as FASKC and a Message Authentication Code (MAC) constructed from a finite automaton. The paper shows how the scheme works and how to construct a MAC from a finite automaton using a boolean function with good cryptographic properties. Due to the construction method and the assumption that the symmetric encryption scheme is secure under Chosen Plaintext Attack (CPA), it is shown that the MAC is unforgeable under Chosen Message Attack (UF-CMA) making the scheme secure under Chosen Ciphertext Attack (CCA).
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [42] WAGE: An Authenticated Encryption with a Twist
    AlTawy, Riham
    Gong, Guang
    Mandal, Kalikinkar
    Rohit, Raghvendra
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 132 - 159
  • [43] Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata
    Faraoun, Kamel Mohamed
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (09) : 3136 - 3148
  • [44] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [45] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129
  • [46] On Committing Authenticated-Encryption
    Chan, John
    Rogaway, Phillip
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 275 - 294
  • [47] RIV for Robust Authenticated Encryption
    Abed, Farzaneh
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 23 - 42
  • [48] Authenticated on-line encryption
    Fouque, PA
    Joux, A
    Martinet, G
    Valette, F
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 145 - 159
  • [49] Authenticated Encryption for FPGA Bitstreams
    Trimberger, Steve
    Moore, Jason
    Lu, Weiguang
    FPGA 11: PROCEEDINGS OF THE 2011 ACM/SIGDA INTERNATIONAL SYMPOSIUM ON FIELD PROGRAMMABLE GATE ARRAYS, 2011, : 83 - 86
  • [50] Authenticated Encryption with Key Identification
    Len, Julia
    Grubbs, Paul
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 181 - 209