Analysis of One-pass Block Cipher Based Authenticated Encryption Schemes
ثبت نشده
چکیده
منابع مشابه
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملThe EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Ef£ciency)
We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryptionwith associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects theprivacy of M and the authenticity of both M and H . Strings N , M , and H are arbitrary bit strings, andthe mode uses 2d|M |/ne + d|H|/ne + d|N |/ne block-cipher calls when these string...
متن کاملThe EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency)
We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryptionwith associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects theprivacy of M and the authenticity of both M and H . Strings N , M , and H are arbitrary bit strings, andthe mode uses 2 |M |/n + |H|/n + |N |/n block-cipher calls when these strings are...
متن کامل