On the security of two improved authenticated encryption schemes

被引:0
作者
Informatics Department, Electronics Research Institute, Cairo, Egypt [1 ]
机构
[1] Informatics Department, Electronics Research Institute, Cairo
来源
Int. J. Secur. Netw. | 2013年 / 4卷 / 194-199期
关键词
Authenticated encryption; Authenticity; Confidentiality; Cryptanalysis;
D O I
10.1504/IJSN.2013.058112
中图分类号
学科分类号
摘要
Authenticated encryption schemes are cryptographic primitives that are used to simultaneously protect the confidentiality and authenticity of communications. In 2003, Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Two years later, Zhang et al. pointed out that these two schemes lack the non-repudiation property and presented a new authenticated encryption scheme to surmount these weaknesses. Besides, in 2006, Hwang et al. presented another forgery attack against the original schemes and proposed some modified schemes to repair these flaws. In this paper, we show that the new authenticated encryption scheme proposed by Zhang et al. does not satisfy its claimed nonrepudiation and authentication properties. We also present an attack against Hwang et al.'s scheme that allows a dishonest referee to decrypt all the future and past authenticated ciphertext between the contending parties. Furthermore, we present a simple fix to prevent these attacks. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:194 / 199
页数:5
相关论文
共 50 条
[41]   Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes [J].
Jovanovic, Philipp ;
Luykx, Atul ;
Mennink, Bart ;
Sasaki, Yu ;
Yasuda, Kan .
JOURNAL OF CRYPTOLOGY, 2019, 32 (03) :895-940
[42]   Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes [J].
Philipp Jovanovic ;
Atul Luykx ;
Bart Mennink ;
Yu Sasaki ;
Kan Yasuda .
Journal of Cryptology, 2019, 32 :895-940
[43]   KDM-CCA Security from RKA Secure Authenticated Encryption [J].
Lu, Xianhui ;
Li, Bao ;
Jia, Dingding .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :559-583
[44]   INT-RUP Security of Checksum-Based Authenticated Encryption [J].
Zhang, Ping ;
Wang, Peng ;
Hu, Honggang ;
Cheng, Changsong ;
Kuai, Wenke .
PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 :147-166
[45]   Efficient convertible authenticated encryption schemes for smart card applications in network environments [J].
Hsu, Chien-Lung ;
Wu, Tzong-Sun ;
Lin, Han-Yu .
WMSCI 2005: 9TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 5, 2005, :13-18
[46]   Reinforcing Lightweight Authenticated Encryption Schemes Against Statistical Ineffective Fault Attack [J].
Ambili, K. N. ;
Jose, Jimmy .
JOURNAL OF CELLULAR AUTOMATA, 2022, 16 (5-6) :363-379
[47]   FPGA implementation and comparison of AES-GCM and Deoxys Authenticated Encryption schemes [J].
Koteshwara, Sandhya ;
Das, Amitabh ;
Parhi, Keshab K. .
2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, :356-359
[48]   Breaking the IOC Authenticated Encryption Mode [J].
Bottinelli, Paul ;
Reyhanitabar, Reza ;
Vaudenay, Serge .
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 :126-135
[49]   Indifferentiable Authenticated Encryption [J].
Barbosa, Manuel ;
Farshim, Pooya .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 :187-220
[50]   The Emergence of Authenticated Encryption [J].
Rogaway, Phillip .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479