Authenticated Encryption Schemes: A Systematic Review

被引:10
|
作者
Jimale, Mohamud Ahmed [1 ]
Z'aba, Muhammad Reza [1 ]
Kiah, Miss Laiha Binti Mat [1 ]
Idris, Mohd Yamani Idna [1 ]
Jamil, Norziana [2 ]
Mohamad, Moesfa Soeheila [3 ]
Rohmad, Mohd Saufy [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Tenaga Nas, Coll Comp & Informat, Kajang 43000, Selangor, Malaysia
[3] MIMOS Berhad, Informat Secur Lab, Kuala Lumpur 57000, Malaysia
[4] Univ Teknol MARA, Fac Elect Engn, Shah Alam 40450, Selangor, Malaysia
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Encryption; Cryptography; Security; NIST; Authentication; Systematics; Classification algorithms; Authenticated encryption; CAESAR competition; confidentiality; integrity; message authentication code; NIST-LW competition; SECURITY;
D O I
10.1109/ACCESS.2022.3147201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features.
引用
下载
收藏
页码:14739 / 14766
页数:28
相关论文
共 50 条
  • [21] Improvement of authenticated encryption schemes with message linkages for message flows
    Hwang, MS
    Lo, JW
    Hsiao, SY
    Chu, YP
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (04) : 1575 - 1577
  • [22] Comparison of Authenticated-Encryption Schemes in Wireless Sensor Networks
    Simplicio, Marcos A., Jr.
    de Oliveira, Bruno T.
    Barreto, Paulo S. L. M.
    Margi, Cintia B.
    Carvalho, Tereza C. M. B.
    Naslund, Mats
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 450 - 457
  • [23] Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks
    Li, Xiaoqian
    Wang, Peng
    Li, Bao
    Sun, Zhelei
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 395 - 406
  • [24] Secure channels based on authenticated encryption schemes: A simple characterization
    Namprempre, C
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 515 - 532
  • [25] On the Related-Key Attack Security of Authenticated Encryption Schemes
    Faust, Sebastian
    Kraemer, Juliane
    Orlt, Maximilian
    Struck, Patrick
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 362 - 386
  • [26] TriviA and uTriviA: two fast and secure authenticated encryption schemes
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (01) : 29 - 48
  • [27] Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET
    Nandi, Mridul
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 126 - 140
  • [28] Improvements of authenticated encryption schemes with message linkages for message flows
    Chen, BH
    COMPUTERS & ELECTRICAL ENGINEERING, 2004, 30 (07) : 465 - 469
  • [29] Efficient public-key authenticated deniable encryption schemes
    Cao, Yanmei
    Wei, Jianghong
    Zhang, Fangguo
    Xiang, Yang
    Chen, Xiaofeng
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [30] On the Security of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
    Rasslan, Mohamed
    4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 : 565 - 569