Deterministic Authenticated Encryption Scheme for Memory Constrained Devices

被引:1
作者
Agrawal, Megha [1 ]
Chang, Donghoon [1 ]
Kang, Jinkeon [1 ,2 ]
机构
[1] Indraprastha Inst Informat Technol, Delhi 110020, India
[2] Korea Univ, Ctr Informat Secur Technol CIST, Seoul 02841, South Korea
关键词
authenticated encryption; nonce-misuse resistance; memory constrained devices;
D O I
10.3390/cryptography2040037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A technique of authenticated encryption for memory constrained devices called sp-AELM was proposed by Agrawal et al. at ACISP 2015. The sp-ALEM construction utilizes a sponge-based primitive to support online encryption and decryption functionalities. Online encryption in the construction is achieved in the standard manner by processing plaintext blocks as they arrive to produce ciphertext blocks. However, decryption is achieved by storing only one intermediate state and releasing it to the user upon correct verification. This intermediate state allows a legitimate user to generate the plaintext herself. However, the scheme is nonce-respecting, i.e., the scheme is insecure if the nonce is repeated. Implementation of a nonce is non-trivial in practice, and reuse of a nonce in an AE scheme is often devastating. In this paper, we propose a new AE scheme called dAELM, which stands for deterministic authenticated encryption (DAE) scheme for low memory devices. DAE is used in domains such as the key wrap, where the available message entropy omits the overhead of a nonce. For limiting memory usage, our idea is to use a session key to encrypt a message and share the session key with the user depending upon the verification of a tag. We provide the security proof of the proposed construction in the ideal cipher model.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 19 条
[1]   sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices [J].
Agrawal, Megha ;
Chang, Donghoon ;
Sanadhya, Somitra .
INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 :451-468
[2]  
Aumasson J.P, 2014, NORX PARALLEL SCALAB
[3]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P317
[4]  
Bellare M, 2006, ADV CRYPTOLOGY EUROC, V2004, P331
[5]   Authenticated encryption: Relations among notions and analysis of the generic composition paradigm [J].
Bellare, Mihir ;
Namprempre, Chanathip .
JOURNAL OF CRYPTOLOGY, 2008, 21 (04) :469-491
[6]  
Bertoni G, KETJE V1
[7]  
Bogdanov A, 2014, ALE AES BASED LIGHTW
[8]  
CAESAR, CAESAR COMPETITION A
[9]  
Dobraunig C, ASCON V1
[10]  
Engels D.W., 2011, HUMMINGBIRD 2 LIGHTW, V7055, P31