Authenticated Encryption Schemes: A Systematic Review

被引:10
|
作者
Jimale, Mohamud Ahmed [1 ]
Z'aba, Muhammad Reza [1 ]
Kiah, Miss Laiha Binti Mat [1 ]
Idris, Mohd Yamani Idna [1 ]
Jamil, Norziana [2 ]
Mohamad, Moesfa Soeheila [3 ]
Rohmad, Mohd Saufy [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Tenaga Nas, Coll Comp & Informat, Kajang 43000, Selangor, Malaysia
[3] MIMOS Berhad, Informat Secur Lab, Kuala Lumpur 57000, Malaysia
[4] Univ Teknol MARA, Fac Elect Engn, Shah Alam 40450, Selangor, Malaysia
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Encryption; Cryptography; Security; NIST; Authentication; Systematics; Classification algorithms; Authenticated encryption; CAESAR competition; confidentiality; integrity; message authentication code; NIST-LW competition; SECURITY;
D O I
10.1109/ACCESS.2022.3147201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features.
引用
下载
收藏
页码:14739 / 14766
页数:28
相关论文
共 50 条
  • [31] McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
    Fleischmann, Ewan
    Forler, Christian
    Lucks, Stefan
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 196 - 215
  • [32] An Area-Optimized Serial Implementation of ICEPOLE Authenticated Encryption Schemes
    Tempelmeier, Michael
    De Santis, Fabrizio
    Kaps, Jens-Peter
    Sigl, Georg
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 49 - 54
  • [33] Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Lomne, Victor
    Mendel, Florian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 369 - 395
  • [34] Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher
    Hasan, Munawar
    Chang, Donghoon
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14357 - 14369
  • [35] The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes
    Bhattacharjee, Arghya
    Lopez, Cuauhtemoc Mancillas
    List, Eik
    Nandi, Mridul
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 305 - 344
  • [36] Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
    Rasslan, Mohamed
    Youssef, Amr
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05) : 1301 - 1302
  • [37] Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version
    Chang, Ting-Yi
    Yang, Chou-Chen
    Hwang, Min-Shiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 151 - 162
  • [38] Cryptanalysis of Tseng et al.'s authenticated encryption schemes
    Qi, X
    Xiu, YY
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 158 (01) : 1 - 5
  • [39] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
    Aljabri, Zainab
    Abawajy, Jemal
    Huda, Shamsul
    Wireless Communications and Mobile Computing, 2023, 2023
  • [40] Efficient convertible authenticated encryption schemes for smart card applications in network environments
    Hsu, Chien-Lung
    Wu, Tzong-Sun
    Lin, Han-Yu
    WMSCI 2005: 9TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 5, 2005, : 13 - 18