A simple authentication encryption scheme

被引:3
|
作者
Mazumder, Rashed [1 ]
Miyaji, Atsuko [1 ,2 ,3 ]
Su, Chunhua [2 ]
机构
[1] Japan Adv Inst Sci & Technol, Sch Informat Sci, Nomi, Japan
[2] Osaka Univ, Grad Sch Engn, Osaka, Japan
[3] Japan Sci & Technol Agcy JST, CREST, Tokyo, Japan
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2017年 / 29卷 / 16期
基金
日本科学技术振兴机构;
关键词
authentication encryption; blockcipher; compression function; IoT; nonce; PADDING ORACLE ATTACKS; INTERNET; THINGS; SECURITY; MOBILE; PROTOCOL; MODES;
D O I
10.1002/cpe.4058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An authentication encryption (AE) scheme satisfies to transfer an authenticated data between 2 parties or more. There are vast applications of the AE such as access control, encryption, enhancing trust between multiple parties, and assure the originality of a message. However, the main challenge of the AE is to maintain low-cost features for its construction. Furthermore, there is another emerging issue of Internet of Things (IoT) in the field of data and network communication. The numbers of application of the IoT are increasing expeditiously, where various kinds of device have been used such as IoT-end device, constrained device, and RfID. Moreover, the main challenge of the IoT-end devices and resource constrained devices is to keep a certain level of security bound including minimum cost. However, the IoT-end devices, resource constrained devices, and RfID have lack of resources such as memory, power, and processors. Interestingly, the AE can play a vital role between data acquisition (sensors, actuators) and data aggregation of usual platform of the IoT. Thus, the construction of the AE should satisfy the properties of low-cost, least resources, and less operating-time. Though, there are many familiar constructions of AE such as OTR, McOE, POE, OAE, APE, COPE, CLOC, and SILK but most of the schemes depend on the features of nonce and associate data. In the aspect of security, the usage of nonce and associated data are adequate. However, these 2 features increase the overhead cost. Therefore, we propose a simple construction of IV-based AE where blockcipher compression function is used as encryption function. Our proposed scheme's efficiency-rate is 1 with reasonable privacy-security bound. In addition, it can encrypt arbitrary length of message in each iteration without padding.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Multilayered Information Encryption Scheme with Fine-grained Authentication
    Chen, Yi-Hui
    Lu, Ching-Hu
    Hsu, Po-Yu
    2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, : 1126 - 1130
  • [22] A fast image encryption and authentication scheme based on chaotic maps
    Yang, Huaqian
    Wong, Kwok-wo
    Liao, Xiaofeng
    Zhang, Wei
    Wei, Pengcheng
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (11) : 3507 - 3517
  • [23] Optical image encryption and authentication scheme with computational ghost imaging
    Guo, Zhe
    Chen, Su-Hua
    Zhou, Ling
    Gong, Li-Hua
    APPLIED MATHEMATICAL MODELLING, 2024, 131 : 49 - 66
  • [24] The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme
    Simplicio, Marcos A., Jr.
    Barbuda, Pedro d'Aquino F. F. S.
    Barreto, Paulo S. L. M.
    Carvalho, Tereza C. M. B.
    Margi, Cintia B.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 165 - 180
  • [25] Towards providing a new lightweight authentication and encryption scheme for MANET
    Tameem Eissa
    Shukor Abd Razak
    M. D. Asri Ngadi
    Wireless Networks, 2011, 17 : 833 - 842
  • [26] Optical image authentication and encryption scheme with computational ghost imaging
    Hu, Jie-Long
    Chen, Ming-Xuan
    Zhou, Shun
    Zhou, Nan-Run
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (17):
  • [27] A New PVSS Scheme with a Simple Encryption Function
    Ben Shil, Assia
    Blibech, Kaouther
    Robbana, Riadh
    Neji, Wafa
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2013, (122): : 11 - 22
  • [28] A Simple Encryption Scheme for Binary Elliptic Curves
    King, Brian
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 273 - 280
  • [29] A simple user authentication scheme for grid computing
    Department of Computer Science and Engineering, Shanghai Jiao Tong University, No.800, Dongchuan Rd., Minghang District, Shanghai, 200240, China
    Int. J. Netw. Secur., 2008, 2 (202-206):
  • [30] A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS
    Yue, Xiaohan
    Zeng, Shuaishuai
    Wang, Xibo
    Yang, Lixin
    Xu, Jian
    Bai, Shi
    He, Yuan
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 232 - 239