Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model
نویسندگان
چکیده
Hirose, Kuwakado and Yoshida proposed a nonce-based authenticated encryption scheme Lae0 based on Lesamnta-LW in 2019. is block-cipher-based iterated hash function included the ISO/IEC 29192-5 lightweight hash-function standard. They also showed that satisfies both privacy authenticity if underlying block cipher pseudorandom permutation. Unfortunately, their result implies only about 64-bit security for instantiation with dedicated of Lesamnta-LW. In this paper, we analyze ideal model. Our 120-bit
منابع مشابه
Provable-Security Analysis of Authenticated Encryption in Kerberos∗
Kerberos is a widely-deployed network authentication protocol that is being considered for standardization. Many works have analyzed its security, identifying flaws and often suggesting fixes, thus helping the protocol’s evolution. Several recent results present successful formalmethods-based verification of a significant portion of the current version 5, and some even imply security in the com...
متن کاملThe Security of Multiple Encryption in the Ideal Cipher Model
Multiple encryption—the practice of composing a blockcipher several times with itself under independent keys—has received considerable attention of late from the standpoint of provable security. Despite these efforts proving definitive security bounds (i.e., with matching attacks) has remained elusive even for the special case of triple encryption. In this paper we close the gap by improving bo...
متن کاملImproved convertible authenticated encryption scheme with provable security
Article history: Received 26 August 2010 Received in revised form 22 November 2010 Accepted 25 March 2011 Available online 14 April 2011 Communicated by L. Viganò
متن کاملAnalysis of Stream Cipher Based Authenticated Encryption Schemes
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2021
ISSN: ['0916-8532', '1745-1361']
DOI: https://doi.org/10.1587/transinf.2021ngp0008