Combining message encryption and authentication

نویسندگان

  • Wojciech Oszywa
  • Rafal Gliwa
چکیده

The first part of the paper explains the need for combining message encryption and authentication. We begin with the example to emphasize the fact that privacy does not imply authenticity. Then we prove, one needs both privacy and authenticity, even if one’s aim is just getting privacy. In the second part we present an overview of different methods for providing authenticated encryption (AE) i.e. generic compositions, single-pass modes and two-pass combined modes. We analyze what are the advantages and disadvantages of different AE constructions. In the third part of the paper we focus on nonce based authenticated encryption modes. Our motivation is the wish to know the methodology of designing authenticated encryption mode of operation. We take into consideration a few most important properties, e.g. parallelizability, memory requirements and pre-processing capability. We analyze possibilities of choice of underlying encryption and authentication components and their order in a message we also try to answer. What does single-key mode really mean? Finally we mention the importance of provable security theory in the security of authenticated encryption modes. ∗E-mail address: [email protected] E-mail address: [email protected] The terms ’privacy’ and ’confidentiality’ are used interchangeably, as defined in [1] Nonce (N) a number used only once within a specified context. Pobrane z czasopisma Annales AIInformatica http://ai.annales.umcs.pl Data: 17/03/2018 23:46:18

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Message Authentication by Integrating Encryption with Hash function and its VLSI Implementation

Presently more techniques are available for improving secure data communication. Public and private key encryption algorithms are available to provide confidentiality. Encryption techniques provide origin authenticity by using shared secret key. Advanced Encryption System (AES) is the specification for the encryption of electronic data established by the U.S. National Institute of Standards and...

متن کامل

A Combined Method for Confidentiality, Integrity, Availability and Authentication (CMCIAA)

--This paper introduces a single method that ensures the Confidentiality, Integrity, Availability and Authentication of the message to be transmitted. Message is encrypted by the latest symmetric encryption standard called AES (Advanced Encryption Standard). A new method for calculating MAC (Message Authentication Code) based on the shared secret key used in AES, is proposed that proves the mes...

متن کامل

RFC 6476 MAC Encryption in CMS

This document specifies the conventions for using Message Authentication Code (MAC) encryption with the Cryptographic Message Syntax (CMS) authenticated-enveloped-data content type. This mirrors the use of a MAC combined with an encryption algorithm that’s already employed in IPsec, Secure Socket Layer / Transport Layer Security (SSL/TLS) and Secure SHell (SSH), which is widely supported in exi...

متن کامل

EHE: nonce misuse-resistant message authentication

We propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt-Hash-Encrypt). In EHE, a message-dependent polynomial is evaluated at the point which is an encrypted nonce. The resulting polynomial hash value is encrypted again and becomes an authentication tag. We prove the prf-security of the EHE scheme and extend it to two authenticated encryption modes which follow the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Annales UMCS, Informatica

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2011