A Forgery Attack on Leaked-State Authenticated Encryption

被引:0
|
作者
Mao, Jieshen [1 ,2 ]
Mu, Daoguang [2 ]
Lai, Xuejia [1 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Cryptol & Informat Secur, Dept Comp Sci & Technol, Shanghai 200030, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
关键词
CASESAR; LAC; birthday paradox; leaked-State authenticated encryption; forgery attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The CAESAR competition is launched in 2013 which aims to find some authenticated encryption with good security and performance. Among these submissions, LAC is designed in a unique way with leaked-state structure. In this paper, based on birthday paradox, we find a forgery attack on LAC in nonce-misused case with time complexity 228. Moreover, we generalize the attack on normal version of leaked-state authenticated encryption and conclude some suggestions on how to use such structure.
引用
收藏
页码:128 / 131
页数:4
相关论文
共 50 条
  • [21] A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm
    Liu, Shuai
    Ren, Jizhou
    Guan, Jie
    Hu, Bin
    Ma, Sudong
    Bai, Hao
    [J]. COMPUTER JOURNAL, 2024, 67 (04): : 1370 - 1380
  • [22] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [23] Publicly verifiable authenticated encryption
    Ma, CS
    Chen, KF
    [J]. ELECTRONICS LETTERS, 2003, 39 (03) : 281 - 282
  • [24] Unconditionally secure authenticated encryption
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Matsumoto, T
    Imai, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1119 - 1131
  • [25] Authenticated Encryption with Variable Stretch
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizar, Damian
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 396 - 425
  • [26] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [27] WAGE: An Authenticated Encryption with a Twist
    AlTawy, Riham
    Gong, Guang
    Mandal, Kalikinkar
    Rohit, Raghvendra
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 132 - 159
  • [28] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [29] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [30] On Committing Authenticated-Encryption
    Chan, John
    Rogaway, Phillip
    [J]. COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 275 - 294