The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme

被引:19
|
作者
Simplicio, Marcos A., Jr. [1 ]
Barbuda, Pedro d'Aquino F. F. S. [1 ]
Barreto, Paulo S. L. M. [1 ]
Carvalho, Tereza C. M. B. [1 ]
Margi, Cintia B. [1 ]
机构
[1] Univ Sao Paulo, Escola Politecn, Lab Agr & Redes Comp, Dept Engn Computacao & Sistemas Digitais PCS, BR-05508900 Sao Paulo, Brazil
关键词
cryptographic algorithms; message authentication codes; authenticated encryption with associated data;
D O I
10.1002/sec.66
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present Marvin, a new parallelizable message authentication code (MAC) based on the ALRED family. The new algorithm is designed with resource-constrained platforms in mind and explores the structure of an underlying block cipher to provide security at a small cost in terms of memory needs. Also, we show how Marvin can be used as an authentication-only function or else in an authenticated encryption with associated data (AEAD) scheme. We define a new AEAD proposal called LetterSoup, which is based on the mode of operation. Finally, we LFSRC analyze the security and performance of the resulting schemes. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:165 / 180
页数:16
相关论文
共 50 条
  • [41] Authenticated encryption scheme based on quadratic residue
    Chen, KF
    ELECTRONICS LETTERS, 1998, 34 (22) : 2115 - 2116
  • [42] A secure authenticated encryption scheme and its extension
    Zhang, Jianhong
    Cheng, Ji
    PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
  • [43] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY
    Chen, Tzung-Her
    Li, Ct-Lin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
  • [44] An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security
    Chen, Dajiang
    Zhang, Ning
    Lu, Rongxing
    Fang, Xiaojie
    Zhang, Kuan
    Qin, Zhiguang
    Shen, Xuemin
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 748 - 761
  • [45] Robust Scheme to Protect Authentication Code of Message/Image Documents in Cloud Computing
    Abduljabbar, Zaid Ameen
    Jin, Hai
    Yassin, Ali A.
    Hussien, Zaid Alaa
    Hussain, Mohammed Abdulridha
    Abbdal, Salah H.
    Zou, Deqing
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016,
  • [46] Dynamic Threshold Proxy Authenticated Encryption Scheme
    Song Yubo
    Hu Aiqun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4637 - 4640
  • [47] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
  • [48] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263
  • [49] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [50] A novel authenticated encryption scheme and its extension
    Zhang, Jianhong
    Zhao, Xubing
    Ji, Cheng
    INFORMATION SCIENCES, 2015, 317 : 196 - 201