Integrity analysis of authenticated encryption based on stream ciphers

被引:5
|
作者
Imamura, Kazuya [1 ]
Minematsu, Kazuhiko [2 ]
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Nagoya, Aichi, Japan
[2] NEC Corp Ltd, Tokyo, Japan
关键词
Authenticated encryption; Stream cipher; Universal hash function; Provable security; Integrity; Releasing unverified plaintext; SECURITY; CODE; OPERATION; MODE;
D O I
10.1007/s10207-017-0378-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the security of authenticated encryption based on a stream cipher and a universal hash function. We consider ChaCha20-Poly1305 and generic constructions proposed by Sarkar, where the generic constructions include 14 AEAD (authenticated encryption with associated data) schemes and 3 DAEAD (deterministic AEAD) schemes. In this paper, we analyze the integrity of these schemes both in the standard INT-CTXT (integrity of ciphertext) notion and in the RUP (releasing unverified plaintext) setting called INT-RUP notion. We present INT-CTXT attacks against 3 out of the 14 AEAD schemes and 1 out of the 3 DAEAD schemes. We then show INT-RUP attacks against 1 out of the 14 AEAD schemes and the 2 remaining DAEAD schemes. Next, we consider ChaCha20-Poly1305 and show that it is provably secure in the INT-RUP notion. Finally, we show that the remaining 10 AEAD schemes are provably secure in the INT-RUP notion.
引用
收藏
页码:493 / 511
页数:19
相关论文
共 50 条
  • [31] Differential power analysis of stream ciphers
    Fischer, W.
    Gammel, B. M.
    Kniffler, O.
    Velten, J.
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 257 - 270
  • [32] Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network
    Hwang, Tzonelih
    Gope, Prosanta
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (07) : 667 - 679
  • [33] RIV for Robust Authenticated Encryption
    Abed, Farzaneh
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 23 - 42
  • [34] Authenticated on-line encryption
    Fouque, PA
    Joux, A
    Martinet, G
    Valette, F
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 145 - 159
  • [35] Authenticated Encryption with Key Identification
    Len, Julia
    Grubbs, Paul
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 181 - 209
  • [36] An authenticated encryption based grouping proof protocol for RFID systems
    Rostampour, Samad
    Bagheri, Nasour
    Hosseinzadeh, Mehdi
    Khademzadeh, Ahmad
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5581 - 5590
  • [37] Lightweight instruction-level encryption for embedded processors using stream ciphers
    Hiscock, Thomas
    Savry, Olivier
    Goubin, Louis
    MICROPROCESSORS AND MICROSYSTEMS, 2019, 64 : 43 - 52
  • [38] Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
    Palash Sarkar
    Cryptography and Communications, 2014, 6 : 189 - 231
  • [39] Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem
    Li, Fagen
    Qin, Zhiguang
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 266 - 269
  • [40] APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
    Andreeva, Elena
    Bilgin, Begul
    Bogdanov, Andrey
    Luykx, Atul
    Mennink, Bart
    Mouha, Nicky
    Yasuda, Kan
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 168 - 186