On the security of two improved authenticated encryption schemes

被引:0
作者
Informatics Department, Electronics Research Institute, Cairo, Egypt [1 ]
机构
[1] Informatics Department, Electronics Research Institute, Cairo
来源
Int. J. Secur. Netw. | 2013年 / 4卷 / 194-199期
关键词
Authenticated encryption; Authenticity; Confidentiality; Cryptanalysis;
D O I
10.1504/IJSN.2013.058112
中图分类号
学科分类号
摘要
Authenticated encryption schemes are cryptographic primitives that are used to simultaneously protect the confidentiality and authenticity of communications. In 2003, Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Two years later, Zhang et al. pointed out that these two schemes lack the non-repudiation property and presented a new authenticated encryption scheme to surmount these weaknesses. Besides, in 2006, Hwang et al. presented another forgery attack against the original schemes and proposed some modified schemes to repair these flaws. In this paper, we show that the new authenticated encryption scheme proposed by Zhang et al. does not satisfy its claimed nonrepudiation and authentication properties. We also present an attack against Hwang et al.'s scheme that allows a dishonest referee to decrypt all the future and past authenticated ciphertext between the contending parties. Furthermore, we present a simple fix to prevent these attacks. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:194 / 199
页数:5
相关论文
共 18 条
[1]  
Boyer J., Chaum D., Damgard I., Pederson T., Convertible undeniable signatures, Crypto'90, pp. 189-205, (1991)
[2]  
Chen K., Message recovery for signature schemes based on the discrete logarithm, Designs, Codes and Cryptography, 7, 1-2, pp. 61-81, (1998)
[3]  
Elgamal T., A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information and Theory, 31, 4, pp. 469-472, (1985)
[4]  
Hsu C.-L., Wu T.-C., Authenticated encryption schemes with (t, n) shared verification, IEE Proceedings in Computers and Digital Technology, 145, 2, pp. 117-120, (1998)
[5]  
Hwang M.-S., Chang C.-C., Hwang K.-F., An ElGamal-like cryptosystem for enciphering large messages, IEEE Transaction on Knowledge and Data Engineering, 14, 2, pp. 445-446, (2002)
[6]  
Hwang M.-S., Hsiao J.-Y., Chu Y.-P., Improvement of authenticated encryption schemes with message linkages for message flows, IEICE Transactions on Information and Systems, E89-D, 4, pp. 1575-1577, (2006)
[7]  
Hwang M.-S., Liu C.-Y., Authenticated encryption schemes: Current status and key issues, International Journal of Network Security, 1, 2, pp. 61-73, (2005)
[8]  
Lee W.-B., Chang C.-C., Authenticated encryption schemes without using a one way function, Electronic Letters, 31, 19, pp. 1656-1657, (1995)
[9]  
Lee M., Kim D., Park K., An authenticated encryption scheme with public verifiability, Japan-Korea Joint Workshop on Algorithms and Computation (WAAC2000), pp. 49-56, (2000)
[10]  
Nyberg K., Rueppel R.A., A new signature scheme based on the DSA giving message recovery, 1st ACM Conference on Computer and Communications Security, pp. 58-61, (1993)