Integrity analysis of authenticated encryption based on stream ciphers

被引:5
|
作者
Imamura, Kazuya [1 ]
Minematsu, Kazuhiko [2 ]
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Nagoya, Aichi, Japan
[2] NEC Corp Ltd, Tokyo, Japan
关键词
Authenticated encryption; Stream cipher; Universal hash function; Provable security; Integrity; Releasing unverified plaintext; SECURITY; CODE; OPERATION; MODE;
D O I
10.1007/s10207-017-0378-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the security of authenticated encryption based on a stream cipher and a universal hash function. We consider ChaCha20-Poly1305 and generic constructions proposed by Sarkar, where the generic constructions include 14 AEAD (authenticated encryption with associated data) schemes and 3 DAEAD (deterministic AEAD) schemes. In this paper, we analyze the integrity of these schemes both in the standard INT-CTXT (integrity of ciphertext) notion and in the RUP (releasing unverified plaintext) setting called INT-RUP notion. We present INT-CTXT attacks against 3 out of the 14 AEAD schemes and 1 out of the 3 DAEAD schemes. We then show INT-RUP attacks against 1 out of the 14 AEAD schemes and the 2 remaining DAEAD schemes. Next, we consider ChaCha20-Poly1305 and show that it is provably secure in the INT-RUP notion. Finally, we show that the remaining 10 AEAD schemes are provably secure in the INT-RUP notion.
引用
收藏
页码:493 / 511
页数:19
相关论文
共 50 条
  • [21] Authenticated Encryption Schemes: A Systematic Review
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 14739 - 14766
  • [22] Design and Simulation of Authenticated Encryption AENOTP Stream Cipher Algorithm
    Hussein, Mohamed Nabil
    Megahed, Mohamed Helmy
    Azeem, Mohamed Hassan Abdel
    2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 393 - 398
  • [23] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
    Salam, Md Iftekhar
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 15 - 26
  • [24] Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
    Khairallah, Mustafa
    Chattopadhyay, Anupam
    Peyrin, Thomas
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2017, 2017, 10698 : 282 - 301
  • [25] The Emergence of Authenticated Encryption
    Rogaway, Phillip
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479
  • [26] Indifferentiable Authenticated Encryption
    Barbosa, Manuel
    Farshim, Pooya
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 187 - 220
  • [27] Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate
    Shen, Yaobin
    Peters, Thomas
    Standaert, Francois-Xavier
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (02) : 1 - 34
  • [28] McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
    Fleischmann, Ewan
    Forler, Christian
    Lucks, Stefan
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 196 - 215
  • [29] The Software Performance of Authenticated-Encryption Modes
    Krovetz, Ted
    Rogaway, Phillip
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 306 - 327
  • [30] Boosting Authenticated Encryption Robustness with Minimal Modifications
    Ashur, Tomer
    Dunkelman, Orr
    Luykx, Atul
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 3 - 33