ε-MACs: Towards More Secure and More Efficient Constructions of Secure Channels

被引:0
|
作者
Alomair, Basel [1 ]
Poovendran, Radha [1 ]
机构
[1] Univ Washington Seattle, NSL, Seattle, WA USA
关键词
Confidentiality; authenticity; message authentication code (MAC); authenticated encryption; encrypt-and-authenticate; universal hash families; MESSAGE-AUTHENTICATION CODE; HASH FUNCTIONS; ENCRYPTION; MODE; PERFORMANCE; OPERATION; GENERATOR;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cryptography, secure channels enable the confidential and authenticated message exchange between authorized users. A generic approach of constructing such channels is by combining an encryption primitive with an authentication primitive (MAC). In this work, we introduce the design of a new cryptographic primitive to be used in the construction of secure channels. Instead of using general purpose MACs, we propose the employment of special purpose MACs, named "epsilon-MACs". The main motive behind this work is the observation that, since the message must be both encrypted and authenticated, there can be a redundancy in the computations performed by the two primitives. If this turned out to be the case, removing such redundancy will improve the efficiency of the overall construction. In addition, computations performed by the encryption algorithm can be further utilized to improve the security of the authentication algorithm. In this work, we show how epsilon-MACs can be designed to reduce the amount of computations required by standard MACs based on universal hash functions, and show how epsilon-MACs can be secured against key-recovery attacks.
引用
收藏
页码:292 / 310
页数:19
相关论文
共 50 条
  • [1] ε-MACs: Toward More Secure and More Efficient Constructions of Secure Channels
    Alomair, Basel
    Poovendran, Radha
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (01) : 204 - 217
  • [2] Towards More Secure Constructions of Adjustable Join Schemes
    Khazaei, Shahram
    Rafiee, Mojtaba
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1078 - 1089
  • [3] TOWARDS MORE SECURE LABELING
    DAVIES, K
    MANUFACTURING CHEMIST, 1988, 59 (09): : 45 - &
  • [4] A more secure and efficient Andrew Secure RPC protocol
    Boonkrong, Sirapat
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2063 - 2077
  • [5] Towards a safer and more secure cyberspace
    Fitz-Gerald, Stuart J.
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (03) : 231 - 231
  • [6] MORE SECURE
    不详
    PERSONNEL, 1989, 66 (01) : 4 - 5
  • [7] Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure
    Liu, Jiasen
    Wang, Xu An
    Zhao, Kaiyang
    Wang, Han
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES (EIDWT 2020), 2020, 47 : 290 - 300
  • [8] More Constructions of Lossy and Correlation-Secure Trapdoor Functions
    Freeman, David Mandell
    Goldreich, Oded
    Kiltz, Eike
    Rosen, Alon
    Segev, Gil
    JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 39 - 74
  • [9] More Constructions of Lossy and Correlation-Secure Trapdoor Functions
    Freeman, David Mandell
    Goldreich, Oded
    Kiltz, Eike
    Rosen, Alon
    Segev, Gil
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 279 - +
  • [10] More Constructions of Lossy and Correlation-Secure Trapdoor Functions
    David Mandell Freeman
    Oded Goldreich
    Eike Kiltz
    Alon Rosen
    Gil Segev
    Journal of Cryptology, 2013, 26 : 39 - 74