McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes

被引:0
作者
Fleischmann, Ewan [1 ]
Forler, Christian [1 ]
Lucks, Stefan [1 ]
机构
[1] Bauhaus Univ Weimar, Weimar, Germany
来源
FAST SOFTWARE ENCRYPTION (FSE 2012) | 2012年 / 7549卷
关键词
authenticated encryption; on-line encryption; provable security; misuse resistant; SECURITY TREATMENT; SINGLE-KEY; MODE; PERFORMANCE; OPERATION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably secure against nonce-respecting adversaries. But they fail badly for more general adversaries. This is not a theoretical observation only-in practice, the reuse of nonces is a frequent issue 1. In recent years, cryptographers developed misuse-resistant schemes for Authenticated Encryption. These guarantee excellent security even against general adversaries which are allowed to reuse nonces. Their disadvantage is that encryption can be performed in an off-line way, only. This paper considers OAE schemes dealing both with nonce-respecting and with general adversaries. It introduces McOE, an efficient design for OAE schemes. For this we present in detail one of the family members, McOE-X, which is a design solely based on a standard block cipher. As all the other member of the McOE family, it provably guarantees reasonable security against general adversaries as well as standard security against nonce-respecting adversaries.
引用
收藏
页码:196 / 215
页数:20
相关论文
共 43 条
[1]  
[Anonymous], 2001, P 8 ACM C COMP COMM
[2]  
[Anonymous], 2009, 197722009 ISOIEC
[3]  
[Anonymous], 2001, P 7 ANN INT C MOB CO
[4]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3017, P389
[5]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P317
[6]  
Bellare M., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P292
[7]  
Bellare M., 2007, IACR CRYPTOLOGY EPRI, V2007, P197
[8]  
Bellare M., 2007, CRYPTOLOGY EPRINT AR
[9]   Authenticated encryption: Relations among notions and analysis of the generic composition paradigm [J].
Bellare, Mihir ;
Namprempre, Chanathip .
JOURNAL OF CRYPTOLOGY, 2008, 21 (04) :469-491
[10]  
Black J, 2005, LECT NOTES COMPUT SC, V3494, P526