ε-MACs: Towards More Secure and More Efficient Constructions of Secure Channels

被引:0
|
作者
Alomair, Basel [1 ]
Poovendran, Radha [1 ]
机构
[1] Univ Washington Seattle, NSL, Seattle, WA USA
关键词
Confidentiality; authenticity; message authentication code (MAC); authenticated encryption; encrypt-and-authenticate; universal hash families; MESSAGE-AUTHENTICATION CODE; HASH FUNCTIONS; ENCRYPTION; MODE; PERFORMANCE; OPERATION; GENERATOR;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cryptography, secure channels enable the confidential and authenticated message exchange between authorized users. A generic approach of constructing such channels is by combining an encryption primitive with an authentication primitive (MAC). In this work, we introduce the design of a new cryptographic primitive to be used in the construction of secure channels. Instead of using general purpose MACs, we propose the employment of special purpose MACs, named "epsilon-MACs". The main motive behind this work is the observation that, since the message must be both encrypted and authenticated, there can be a redundancy in the computations performed by the two primitives. If this turned out to be the case, removing such redundancy will improve the efficiency of the overall construction. In addition, computations performed by the encryption algorithm can be further utilized to improve the security of the authentication algorithm. In this work, we show how epsilon-MACs can be designed to reduce the amount of computations required by standard MACs based on universal hash functions, and show how epsilon-MACs can be secured against key-recovery attacks.
引用
收藏
页码:292 / 310
页数:19
相关论文
共 50 条
  • [41] Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
    Zheng, Yifeng
    Lai, Shangqi
    Liu, Yi
    Yuan, Xingliang
    Yi, Xun
    Wang, Cong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 988 - 1001
  • [42] Making models more secure: An efficient model stealing detection method
    Zhang, Chenlong
    Luo, Senlin
    Pan, Limin
    Lu, Chuan
    Zhang, Zhao
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 117
  • [43] Energy storage systems make DG more reliable, efficient, secure
    不详
    POWER, 2002, 146 (07) : 62 - +
  • [44] Is Hardware More Secure Than Software?
    Zhao, Lianying
    Lie, David
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 8 - 17
  • [45] A shared responsibility for a more secure world
    Thakur, R
    GLOBAL GOVERNANCE, 2005, 11 (03) : 281 - 289
  • [46] TOWARD A MORE SECURE OFFICE BUILDING
    MENKUS, B
    OFFICE ADMINISTRATION AND AUTOMATION, 1983, 44 (09): : 33 - 35
  • [47] Fixing intelligence: For a more secure America
    不详
    VIRGINIA QUARTERLY REVIEW, 2003, 79 (03) : 93 - 93
  • [48] Fixing Intelligence: For a More Secure America
    Hanyok, Robert J.
    INTELLIGENCE AND NATIONAL SECURITY, 2005, 20 (02) : 374 - 375
  • [49] And Then ThereWere More: Secure Communication for More Than Two Parties
    Naylor, David
    Li, Richard
    Gkantsidis, Christos
    Karagiannis, Thomas
    Steenkiste, Peter
    CONEXT'17: PROCEEDINGS OF THE 2017 THE 13TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, 2017, : 88 - 100
  • [50] A more secure world: Some reflections
    Maley, W
    SECURITY DIALOGUE, 2005, 36 (03) : 364 - 366