An Efficient Scheme of Authenticated Encryption with Associated Data

被引:1
|
作者
Zhang, Shaolan [1 ,2 ]
Xing, Guobo [2 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing 100876, Peoples R China
[2] Shandong Jianzhu Univ, Sch Comp Sci & Technol, Shandong 250101, Jinan, Peoples R China
关键词
Block Cipher; Collision Resistant Hash Function; Collision attack; Authenticated Encryption Mode; Authenticated Encryption with Associated Data;
D O I
10.1109/CCDC.2010.5498386
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An efficient scheme of authenticated encryption with associated data is provided by combining a collision resistant hash function with an authenticated encryption scheme. The hash function is used to compress an arbitrary length header to a fixed length nounce. The authenticated encryption scheme is the improvement of OCB mode of operation. OCB is believed to provide extremely high protection with encryption and message authentication in a most efficient way. However, when OCB mode of operation is used to handle large amount of data, it is easy to find collision so that the mode will lose the authenticity capability with probability one. An improved scheme on the checksum is proposed to avoid the existing collision attacks efficiently. The random element without additional complicated calculation is introduced to translate the segment plaintexts in the checksum. At last, the security of the scheme of authenticated encryption with associated data is analyzed.
引用
收藏
页码:4217 / +
页数:2
相关论文
共 50 条
  • [21] An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment
    Yang, Jen-Ho
    Chang, Ya-Fen
    Chen, Yi-Hui
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 315 - 324
  • [22] An Efficient Authenticated-Encryption with Associated-Data Block Cipher Mode for Wireless Sensor Networks
    Adekunle, A. A.
    Woodhead, S. R.
    [J]. WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 375 - 385
  • [23] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
  • [24] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [25] Is RCB a Leakage Resilient Authenticated Encryption Scheme?
    Abed, Farzaneh
    Berti, Francesco
    Lucks, Stefan
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52
  • [26] Improvement of publicly verifiable authenticated encryption scheme
    雷飞宇
    陈雯
    马昌社
    陈克非
    [J]. Journal of Harbin Institute of Technology(New series), 2007, (01) : 26 - 28
  • [27] A secure authenticated encryption scheme and its extension
    Zhang, Jianhong
    Cheng, Ji
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
  • [28] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY
    Chen, Tzung-Her
    Li, Ct-Lin
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
  • [29] Authenticated encryption scheme based on quadratic residue
    Chen, KF
    [J]. ELECTRONICS LETTERS, 1998, 34 (22) : 2115 - 2116
  • [30] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25