Integrity analysis of authenticated encryption based on stream ciphers

被引:5
|
作者
Imamura, Kazuya [1 ]
Minematsu, Kazuhiko [2 ]
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Nagoya, Aichi, Japan
[2] NEC Corp Ltd, Tokyo, Japan
关键词
Authenticated encryption; Stream cipher; Universal hash function; Provable security; Integrity; Releasing unverified plaintext; SECURITY; CODE; OPERATION; MODE;
D O I
10.1007/s10207-017-0378-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the security of authenticated encryption based on a stream cipher and a universal hash function. We consider ChaCha20-Poly1305 and generic constructions proposed by Sarkar, where the generic constructions include 14 AEAD (authenticated encryption with associated data) schemes and 3 DAEAD (deterministic AEAD) schemes. In this paper, we analyze the integrity of these schemes both in the standard INT-CTXT (integrity of ciphertext) notion and in the RUP (releasing unverified plaintext) setting called INT-RUP notion. We present INT-CTXT attacks against 3 out of the 14 AEAD schemes and 1 out of the 3 DAEAD schemes. We then show INT-RUP attacks against 1 out of the 14 AEAD schemes and the 2 remaining DAEAD schemes. Next, we consider ChaCha20-Poly1305 and show that it is provably secure in the INT-RUP notion. Finally, we show that the remaining 10 AEAD schemes are provably secure in the INT-RUP notion.
引用
收藏
页码:493 / 511
页数:19
相关论文
共 50 条
  • [21] Stream ciphers based on NLFSR
    Soriano, M
    ITS '98 PROCEEDINGS - SBT/IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 1998, : 528 - 533
  • [22] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS
    Salam, Iftekhar
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Wong, Kenneth Koon-Ho
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 961 - 966
  • [23] Design and Simulation of Authenticated Encryption AENOTP Stream Cipher Algorithm
    Hussein, Mohamed Nabil
    Megahed, Mohamed Helmy
    Azeem, Mohamed Hassan Abdel
    2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 393 - 398
  • [24] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
    Salam, Md Iftekhar
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 15 - 26
  • [25] Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
    Khairallah, Mustafa
    Chattopadhyay, Anupam
    Peyrin, Thomas
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2017, 2017, 10698 : 282 - 301
  • [26] Cache Timing Analysis of LFSR-Based Stream Ciphers
    Leander, Gregor
    Zenner, Erik
    Hawkes, Philip
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 433 - +
  • [27] An Encryption Scheme using Dynamic Keys and Stream Ciphers for Embedded Devices
    Oikonomou, Chrysoula
    Kouzinopoulos, Charalampos S.
    Ioannidis, Dimosthenis
    Tzovaras, Dimitrios
    2022 11TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2022, : 40 - 43
  • [28] Parallelizable and Authenticated Online Ciphers
    Andreeva, Elena
    Bogdanov, Andrey
    Luykx, Atul
    Mennink, Bart
    Tischhauser, Elmar
    Yasuda, Kan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 424 - 443
  • [29] Specific Authenticated Encryption Algorithm Based on SM4 Under Framework of Stream Cipher
    Li, Hu
    Peng, Changgen
    Hou, Jinqiu
    Computer Engineering and Applications, 2024, 60 (02) : 272 - 278
  • [30] Stream ciphers based on the elliptic curves
    Nithin, V. S.
    Deepthi, P. P.
    Dbanaraj, K. J.
    Sathidevi, R. S.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 99 - 104