On the security of two improved authenticated encryption schemes

被引:0
作者
Informatics Department, Electronics Research Institute, Cairo, Egypt [1 ]
机构
[1] Informatics Department, Electronics Research Institute, Cairo
来源
Int. J. Secur. Netw. | 2013年 / 4卷 / 194-199期
关键词
Authenticated encryption; Authenticity; Confidentiality; Cryptanalysis;
D O I
10.1504/IJSN.2013.058112
中图分类号
学科分类号
摘要
Authenticated encryption schemes are cryptographic primitives that are used to simultaneously protect the confidentiality and authenticity of communications. In 2003, Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Two years later, Zhang et al. pointed out that these two schemes lack the non-repudiation property and presented a new authenticated encryption scheme to surmount these weaknesses. Besides, in 2006, Hwang et al. presented another forgery attack against the original schemes and proposed some modified schemes to repair these flaws. In this paper, we show that the new authenticated encryption scheme proposed by Zhang et al. does not satisfy its claimed nonrepudiation and authentication properties. We also present an attack against Hwang et al.'s scheme that allows a dishonest referee to decrypt all the future and past authenticated ciphertext between the contending parties. Furthermore, we present a simple fix to prevent these attacks. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:194 / 199
页数:5
相关论文
共 50 条
[31]   An Area-Optimized Serial Implementation of ICEPOLE Authenticated Encryption Schemes [J].
Tempelmeier, Michael ;
De Santis, Fabrizio ;
Kaps, Jens-Peter ;
Sigl, Georg .
PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, :49-54
[32]   McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes [J].
Fleischmann, Ewan ;
Forler, Christian ;
Lucks, Stefan .
FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 :196-215
[33]   The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes [J].
Bhattacharjee, Arghya ;
Lopez, Cuauhtemoc Mancillas ;
List, Eik ;
Nandi, Mridul .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) :305-344
[34]   Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher [J].
Hasan, Munawar ;
Chang, Donghoon .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08) :14357-14369
[35]   Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes [J].
Dobraunig, Christoph ;
Eichlseder, Maria ;
Korak, Thomas ;
Lomne, Victor ;
Mendel, Florian .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :369-395
[36]   A Security Framework for NoC Using Authenticated Encryption and Session Keys [J].
Kapoor, Hemangee K. ;
Rao, G. Bhoopal ;
Arshi, Sharique ;
Trivedi, Gaurav .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2013, 32 (06) :2605-2622
[37]   Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes [J].
Phan, Raphael C. -W. .
2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, :134-139
[38]   Cryptanalysis of Tseng et al.'s authenticated encryption schemes [J].
Qi, X ;
Xiu, YY .
APPLIED MATHEMATICS AND COMPUTATION, 2004, 158 (01) :1-5
[39]   WAGE: An Authenticated Encryption with a Twist [J].
AlTawy, Riham ;
Gong, Guang ;
Mandal, Kalikinkar ;
Rohit, Raghvendra .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 :132-159
[40]   Security weaknesses of certain broadcast encryption schemes [J].
Mihaljevic, Miodrag J. ;
Fossorier, Marc P. C. ;
Imai, Hideki .
DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS, 2006, 3919 :228-245