Robust authenticated encryption scheme with message linkages

被引:0
作者
Yoon, EJ [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
来源
KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS | 2005年 / 3684卷
关键词
cryptography; authenticated encryption; message linkage; signature;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An authenticated encryption scheme is a message transmission scheme, which sends messages in a secure and authentic way. In large message transmission, traditional authenticated encryption scheme has the disadvantage that the communication and the computation costs are too high. In 2002, Tseng-Jan proposed an efficient authenticated encryption scheme with messages linkage; that is, only a random number was used and the communication costs and the computational complexity were better than previously proposed schemes. The current paper, however, points out that Tseng-Jan's scheme suffers from serious security faults such that any adversary can easily forge valid signature blocks and pass the receiver's verification, and the scheme does not provide forward secrecy and non-repudiation. We also propose an improvement to the scheme to overcome the weaknesses.
引用
收藏
页码:281 / 288
页数:8
相关论文
共 11 条
[1]  
BOYAR J, 1991, CRYPTO 90, P189
[2]   Improvements of authenticated encryption schemes with message linkages for message flows [J].
Chen, BH .
COMPUTERS & ELECTRICAL ENGINEERING, 2004, 30 (07) :465-469
[3]   AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS [J].
HORSTER, P ;
MICHELS, M ;
PETERSEN, H .
ELECTRONICS LETTERS, 1994, 30 (15) :1212-1213
[4]   Authenticated encryption schemes with message linkage [J].
Hwang, SJ ;
Chang, CC ;
Yang, WP .
INFORMATION PROCESSING LETTERS, 1996, 58 (04) :189-194
[5]  
LEE M, 2000, JAP KOR JOINT WORKSH, P49
[6]   Authenticated encryption schemes with linkage between message blocks [J].
Lee, WB ;
Chang, CC .
INFORMATION PROCESSING LETTERS, 1997, 63 (05) :247-250
[7]   AUTHENTICATED ENCRYPTION SCHEME WITHOUT USING A ONE-WAY FUNCTION [J].
LEE, WB ;
CHANG, CC .
ELECTRONICS LETTERS, 1995, 31 (19) :1656-1657
[8]  
Menezes A. J, 1997, HDB APPL CRYPTOGRAPH
[9]  
Nyberg K., 1996, Designs, Codes and Cryptography, V7, P61, DOI 10.1007/BF00125076
[10]  
Nyberg K., 1994, ADV CRYPTOLOGY EUROC, P175