Authenticated Encryption Schemes: A Systematic Review

被引:0
|
作者
Jimale, Mohamud Ahmed [1 ]
Z'aba, Muhammad Reza [1 ]
Kiah, Miss Laiha Binti Mat [1 ]
Idris, Mohd Yamani Idna [1 ]
Jamil, Norziana [2 ]
Mohamad, Moesfa Soeheila [3 ]
Rohmad, Mohd Saufy [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Tenaga Nas, Coll Comp & Informat, Kajang 43000, Selangor, Malaysia
[3] MIMOS Berhad, Informat Secur Lab, Kuala Lumpur 57000, Malaysia
[4] Univ Teknol MARA, Fac Elect Engn, Shah Alam 40450, Selangor, Malaysia
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Encryption; Cryptography; Security; NIST; Authentication; Systematics; Classification algorithms; Authenticated encryption; CAESAR competition; confidentiality; integrity; message authentication code; NIST-LW competition; SECURITY;
D O I
10.1109/ACCESS.2022.3147201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features.
引用
收藏
页码:14739 / 14766
页数:28
相关论文
共 50 条
  • [1] Authenticated encryption schemes with message linkage
    Hwang, SJ
    Chang, CC
    Yang, WP
    [J]. INFORMATION PROCESSING LETTERS, 1996, 58 (04) : 189 - 194
  • [2] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
  • [3] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [4] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    [J]. Int. J. Secur. Netw., 2013, 4 (194-199):
  • [5] Authenticated Encryption Schemes on Java']Java Card
    Pal, Rajesh Kumar
    [J]. 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 238 - 245
  • [6] Key Assignment Schemes with Authenticated Encryption, revisited
    Pijnenburg, Jeroen
    Poettering, Bertram
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 40 - 67
  • [7] AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS
    HORSTER, P
    MICHELS, M
    PETERSEN, H
    [J]. ELECTRONICS LETTERS, 1994, 30 (15) : 1212 - 1213
  • [8] Efficient authenticated encryption schemes with public verifiability
    Wang, GL
    Bao, F
    Ma, CS
    Chen, KF
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3258 - 3261
  • [9] Security Analysis of Two Authenticated Encryption Schemes
    Zhang, Jianhong
    Geng, Qin
    [J]. 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163
  • [10] Automated Analysis and Synthesis of Authenticated Encryption Schemes
    Viet Tung Hoang
    Katz, Jonathan
    Malozemoff, Alex J.
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 84 - 95