The FCM Scheme for Authenticated Encryption

被引:0
作者
Lei, Xiaomei [1 ]
Wu, Zhongdong [1 ]
Yong, Jiu [1 ]
机构
[1] Lanzhou Jiaotong Univ, Sch Elect & Informat Engn, Lanzhou 730070, Gansu, Peoples R China
来源
PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017) | 2017年 / 126卷
关键词
Authenticated encryption; compression function; FMAC; Galois/Counter Mode;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
We propose an advanced authenticated encryption with associated data (AEAD) scheme called FCM (compression Function/Counter Mode) based on a compression function required to be a pseudorandom function (PRF) against related key attacks. FCM adopts the stream cipher generated by parallel compression function to encrypt plaintexts, and then utilizes compression Function-based MAC (FMAC) to produce the authentication tag, in which FMAC is a variant of the Merkle-Damgard construction with a permutation. In this structure, FCM successfully avoids introducing the string representing lengths of plaintext and associated data in the generation of the authentication tag, which is a shortage in Galois/Counter Mode (GCM) especially for short message. Then we analyze the security of FCM from two aspects of encryption and authentication based on secure underlying primitives. At last features of FCM are summarized and compared with GCM.
引用
收藏
页码:1123 / 1129
页数:7
相关论文
共 50 条
[21]   RPCAE: a novel revocable proxy convertible authenticated encryption scheme [J].
Han-Yu Lin .
International Journal of Information Security, 2015, 14 :431-441
[22]   Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem [J].
Li, Fagen ;
Qin, Zhiguang .
IETE TECHNICAL REVIEW, 2010, 27 (03) :266-269
[23]   A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking [J].
Chen, Zhen ;
Zhang, Wenfang ;
Wang, Xiaomin .
2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, :10-13
[24]   Provably secure proxy convertible authenticated encryption scheme based on RSA [J].
Wu, Tzong-Sun ;
Lin, Han-Yu .
INFORMATION SCIENCES, 2014, 278 :577-587
[25]   A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking [J].
Chen, Zhen ;
Zhang, Wenfang ;
Wang, Xiaomin .
2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, :27-30
[26]   Toward a Fully Secure Authenticated Encryption Scheme from a Pseudorandom Permutation [J].
Choi, Wonseok ;
Lee, Byeonghak ;
Lee, Jooyoung ;
Lee, Yeongmin .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT III, 2021, 13092 :407-434
[27]   The Emergence of Authenticated Encryption [J].
Rogaway, Phillip .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479
[28]   Indifferentiable Authenticated Encryption [J].
Barbosa, Manuel ;
Farshim, Pooya .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 :187-220
[29]   Cryptanalysis of an authenticated encryption scheme using self-certified public keys [J].
Tsai, CS ;
Lin, SC ;
Hwang, MS .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) :118-122
[30]   An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment [J].
Yang, Jen-Ho ;
Chang, Ya-Fen ;
Chen, Yi-Hui .
INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04) :315-324