Integrity analysis of authenticated encryption based on stream ciphers

被引:5
|
作者
Imamura, Kazuya [1 ]
Minematsu, Kazuhiko [2 ]
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Nagoya, Aichi, Japan
[2] NEC Corp Ltd, Tokyo, Japan
关键词
Authenticated encryption; Stream cipher; Universal hash function; Provable security; Integrity; Releasing unverified plaintext; SECURITY; CODE; OPERATION; MODE;
D O I
10.1007/s10207-017-0378-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the security of authenticated encryption based on a stream cipher and a universal hash function. We consider ChaCha20-Poly1305 and generic constructions proposed by Sarkar, where the generic constructions include 14 AEAD (authenticated encryption with associated data) schemes and 3 DAEAD (deterministic AEAD) schemes. In this paper, we analyze the integrity of these schemes both in the standard INT-CTXT (integrity of ciphertext) notion and in the RUP (releasing unverified plaintext) setting called INT-RUP notion. We present INT-CTXT attacks against 3 out of the 14 AEAD schemes and 1 out of the 3 DAEAD schemes. We then show INT-RUP attacks against 1 out of the 14 AEAD schemes and the 2 remaining DAEAD schemes. Next, we consider ChaCha20-Poly1305 and show that it is provably secure in the INT-RUP notion. Finally, we show that the remaining 10 AEAD schemes are provably secure in the INT-RUP notion.
引用
收藏
页码:493 / 511
页数:19
相关论文
共 50 条
  • [41] ID-based ring authenticated encryption
    Cao, TJ
    Lin, DD
    Xue, R
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 591 - 596
  • [42] Differential power analysis of stream ciphers with LFSRs
    Qu, Bo
    Gu, Dawu
    Guo, Zheng
    Liu, Junrong
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1291 - 1299
  • [43] On Analysis of Lightweight Stream Ciphers with Keyed Update
    Kara, Orhun
    Esgin, Muhammed F.
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (01) : 99 - 110
  • [44] An analysis of the Hermes8 Stream Ciphers
    Babbage, Steve
    Cid, Carlos
    Pramstaller, Norbert
    Raddum, Havard
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 1 - +
  • [45] Deep Learning based Cryptanalysis of Stream Ciphers
    Mishra, Girish
    Gupta, Indivar
    Murthy, S. V. S. S. N. V. G. Krishna
    Pal, S. K.
    DEFENCE SCIENCE JOURNAL, 2021, 71 (04) : 499 - 506
  • [46] A New Stream Ciphers Based on Hyperchaotic Map
    Lin Jinqiu
    Si Xicai
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 366 - 369
  • [47] Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques
    Jallouli, Ons
    El Assad, Safwan
    Chetto, Maryline
    Lozi, Rene
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (11) : 13391 - 13417
  • [48] Image encryption using HC-128 and HC-256 stream ciphers
    Jolfaei, Alireza
    Vizandan, Ahmadreza
    Mirghadri, Abdolrasoul
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (01) : 19 - 42
  • [49] Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques
    Ons Jallouli
    Safwan El Assad
    Maryline Chetto
    René Lozi
    Multimedia Tools and Applications, 2018, 77 : 13391 - 13417
  • [50] The Emergence of Authenticated Encryption
    Rogaway, Phillip
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479