An Efficient Scheme of Authenticated Encryption with Associated Data

被引:1
|
作者
Zhang, Shaolan [1 ,2 ]
Xing, Guobo [2 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing 100876, Peoples R China
[2] Shandong Jianzhu Univ, Sch Comp Sci & Technol, Shandong 250101, Jinan, Peoples R China
关键词
Block Cipher; Collision Resistant Hash Function; Collision attack; Authenticated Encryption Mode; Authenticated Encryption with Associated Data;
D O I
10.1109/CCDC.2010.5498386
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An efficient scheme of authenticated encryption with associated data is provided by combining a collision resistant hash function with an authenticated encryption scheme. The hash function is used to compress an arbitrary length header to a fixed length nounce. The authenticated encryption scheme is the improvement of OCB mode of operation. OCB is believed to provide extremely high protection with encryption and message authentication in a most efficient way. However, when OCB mode of operation is used to handle large amount of data, it is easy to find collision so that the mode will lose the authenticity capability with probability one. An improved scheme on the checksum is proposed to avoid the existing collision attacks efficiently. The random element without additional complicated calculation is introduced to translate the segment plaintexts in the checksum. At last, the security of the scheme of authenticated encryption with associated data is analyzed.
引用
收藏
页码:4217 / +
页数:2
相关论文
共 50 条
  • [1] An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection
    Huang, Wen
    Liao, Yongjian
    Zhou, Shijie
    Chen, Hongjie
    [J]. IEEE ACCESS, 2019, 7 : 43453 - 43461
  • [2] An efficient convertible authenticated encryption-scheme and its variant
    Huang, HF
    Chang, CC
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 382 - 392
  • [3] The mF mode of authenticated encryption with associated data
    Chakraborty, Bishwajit
    Nandi, Mridul
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2022, 16 (01) : 73 - 97
  • [4] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919
  • [5] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [6] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [7] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129
  • [8] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [9] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [10] An Improved Authenticated Encryption Scheme
    Li, Fagen
    Deng, Jiang
    Takagi, Tsuyoshi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2171 - 2172