Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

被引:13
作者
Zhang, Fan [1 ,2 ,3 ,4 ]
Liang, Zi-yuan [1 ,2 ,4 ]
Yang, Bo-lin [1 ]
Zhao, Xin-jie [5 ]
Guo, Shi-ze [5 ]
Ren, Kui [2 ,4 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Zhejiang Univ, Inst Cyberspace Res, Hangzhou 310027, Zhejiang, Peoples R China
[3] State Key Lab Cryptol, Beijing 100878, Peoples R China
[4] Alibaba Zhejiang Univ Joint Inst Frontier Technol, Hangzhou 310027, Zhejiang, Peoples R China
[5] Inst North Elect Equipment, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
CAESAR competition; Authenticated cipher; Block cipher; Stream cipher; Hash function; Security evaluation;
D O I
10.1631/FITEE.1800576
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) supported by the National Institute of Standards and Technology (NIST) is an ongoing project calling for submissions of authenticated encryption (AE) schemes. The competition itself aims at enhancing both the design of AE schemes and related analysis. The design goal is to pursue new AE schemes that are more secure than advanced encryption standard with Galois/counter mode (AES-GCM) and can simultaneously achieve three design aspects: security, applicability, and robustness. The competition has a total of three rounds and the last round is approaching the end in 2018. In this survey paper, we first introduce the requirements of the proposed design and the progress of candidate screening in the CAESAR competition. Second, the candidate AE schemes in the final round are classified according to their design structures and encryption modes. Third, comprehensive performance and security evaluations are conducted on these candidates. Finally, the research trends of design and analysis of AE for the future are discussed.
引用
收藏
页码:1475 / 1499
页数:25
相关论文
共 146 条
  • [1] AES-GCM and AEGIS: Efficient and High Speed Hardware Implementations
    Abdellatif, Karim M.
    Chotin-Avot, Roselyne
    Mehrez, Habib
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 88 (01): : 1 - 12
  • [2] Agrawal Megha, 2017, International Journal of Applied Cryptography, V3, P236
  • [3] Al Mahri HQ, 2017, FAULT BASED ATTACK A
  • [4] Al Mahri HQ, 2016, P 6 INT C APPL TECHN
  • [5] Andreeva E, 2015, AES COPA V 2 CAESAR
  • [6] Andreeva E, 2016, AESCOPA V 1 SUBMISSI
  • [7] Andreeva E, 2016, CAESAR 3 ROUND SUBMI
  • [8] [Anonymous], 2016, AUTHENTICATED CIPHER
  • [9] [Anonymous], 2004, NIST MODES OPERATION
  • [10] [Anonymous], 2017, NISTIR, DOI DOI 10.6028/NIST.IR.8369