A simple authentication encryption scheme

被引:3
|
作者
Mazumder, Rashed [1 ]
Miyaji, Atsuko [1 ,2 ,3 ]
Su, Chunhua [2 ]
机构
[1] Japan Adv Inst Sci & Technol, Sch Informat Sci, Nomi, Japan
[2] Osaka Univ, Grad Sch Engn, Osaka, Japan
[3] Japan Sci & Technol Agcy JST, CREST, Tokyo, Japan
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2017年 / 29卷 / 16期
基金
日本科学技术振兴机构;
关键词
authentication encryption; blockcipher; compression function; IoT; nonce; PADDING ORACLE ATTACKS; INTERNET; THINGS; SECURITY; MOBILE; PROTOCOL; MODES;
D O I
10.1002/cpe.4058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An authentication encryption (AE) scheme satisfies to transfer an authenticated data between 2 parties or more. There are vast applications of the AE such as access control, encryption, enhancing trust between multiple parties, and assure the originality of a message. However, the main challenge of the AE is to maintain low-cost features for its construction. Furthermore, there is another emerging issue of Internet of Things (IoT) in the field of data and network communication. The numbers of application of the IoT are increasing expeditiously, where various kinds of device have been used such as IoT-end device, constrained device, and RfID. Moreover, the main challenge of the IoT-end devices and resource constrained devices is to keep a certain level of security bound including minimum cost. However, the IoT-end devices, resource constrained devices, and RfID have lack of resources such as memory, power, and processors. Interestingly, the AE can play a vital role between data acquisition (sensors, actuators) and data aggregation of usual platform of the IoT. Thus, the construction of the AE should satisfy the properties of low-cost, least resources, and less operating-time. Though, there are many familiar constructions of AE such as OTR, McOE, POE, OAE, APE, COPE, CLOC, and SILK but most of the schemes depend on the features of nonce and associate data. In the aspect of security, the usage of nonce and associated data are adequate. However, these 2 features increase the overhead cost. Therefore, we propose a simple construction of IV-based AE where blockcipher compression function is used as encryption function. Our proposed scheme's efficiency-rate is 1 with reasonable privacy-security bound. In addition, it can encrypt arbitrary length of message in each iteration without padding.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
    Yap, Wun-She
    Liu, Joseph K.
    Tan, Syh-Yuan
    Goi, Bok-Min
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3094 - 3098
  • [32] A face authentication-based searchable encryption scheme for mobile device
    Yue, Xiaohan
    Yi, Gang
    Si, Haoran
    Yang, Haibo
    Bai, Shi
    He, Yuan
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01):
  • [33] An Efficient Smart Card Based Authentication Scheme Using Image Encryption
    Chang, Chin-Chen
    Wu, Hsiao-Ling
    Wang, Zhi-Hui
    Mao, Qian
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (06) : 1135 - 1150
  • [34] An authentication and encryption scheme of network management message based on device fingerprint
    Zhang, Dengyin
    Xu, Jinlian
    Cheng, Chunling
    Xue, Qinghan
    Information Technology Journal, 2013, 12 (06) : 1206 - 1212
  • [35] Fast handoff authentication scheme of WLAN based on self-encryption
    Research Centre of Information Security, Southeast University, Nanjing 210096, China
    Dongnan Daxue Xuebao, 2007, 6 (945-949):
  • [36] An Authentication Scheme with Attribute-Based Encryption for Power Internet of Things
    Duan, Xiangjun
    Li, Yunshuo
    Xu, Yuanyuan
    Liu, Wei
    Zhang, Zhengkai
    Liu, Lei
    Li, Ying
    Xu, Mengyu
    PROCEEDINGS OF THE 2024 3RD INTERNATIONAL CONFERENCE ON NETWORKS, COMMUNICATIONS AND INFORMATION TECHNOLOGY, CNCIT 2024, 2024, : 161 - 165
  • [37] SANSCrypt: A Sporadic-Authentication-Based Sequential Logic Encryption Scheme
    Hu, Yinghua
    Yang, Kaixin
    Nazarian, Shahin
    Nuzzo, Pierluigi
    2020 IFIP/IEEE 28TH INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2020, : 129 - 134
  • [38] A Simple Lightweight Encryption Scheme for Wireless Sensor Networks
    Biswas, Kamanashis
    Muthukkumarasamy, Vallipuram
    Sithirasenan, Elankayer
    Singh, Kalvinder
    DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2014, 2014, 8314 : 499 - 504
  • [39] A Simple Authentication Scheme and Access Control Protocol for VANETs
    Wu, Wei-Chen
    Chen, Yi-Ming
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 259 - 272
  • [40] An improved simple user authentication scheme for grid computing
    Lee, Cheng-Chi
    Ko, Hsien-Ju
    Chen, Shun-Der
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 113 - 124