Cryptanalysis of Tseng et al.'s authenticated encryption schemes

被引:0
|
作者
Qi, X [1 ]
Xiu, YY
机构
[1] Hangzhou Teachers Coll, Sch Informat & Engn, Hangzhou 310012, Zhejiang, Peoples R China
[2] Zhejiang Univ, Dept Math, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; authenticated encryption; message linkage; self-certified public key;
D O I
10.1016/j.amc.2003.08.084
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 2003, Tseng et al. proposed two types of authenticated encryption schemes with message recovery using self-certified public keys. One is suitable for the short message. To the large message, they proposed the other authenticated encryption scheme with message linkages for message flows. An attack is proposed to show that the Tseng et al.'s schemes are not secure in the following cases, which the specified verifier substitutes his secret key, or the signer generates the signature with these schemes for two or more specified verifiers. A small modification to their schemes can satisfy the security requirement. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [31] Cryptanalysis of Kumar et al.'s Authentication Protocol for Wireless Sensor Networks
    Ha, Sewan
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    Lee, Youngsook
    INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 329 - 340
  • [32] Cryptanalysis of Alvarez et al. key exchange scheme
    Kamal, Abdel Alim
    Youssef, Amr M.
    INFORMATION SCIENCES, 2013, 223 : 317 - 321
  • [33] The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
    Khovratovich, Dmitry
    Rechberger, Christian
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 174 - 184
  • [34] Impossible differential cryptanalysis of the Gimli authenticated encryption scheme
    Tan H.
    Shen B.
    Miao X.
    Zhang W.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (05): : 213 - 220
  • [35] Authenticated encryption schemes with message linkage
    Hwang, SJ
    Chang, CC
    Yang, WP
    INFORMATION PROCESSING LETTERS, 1996, 58 (04) : 189 - 194
  • [36] Cryptanalysis and improvement of practical convertible authenticated encryption schemes using self-certified public keys
    Shao, Zuhua
    INFORMATICA, 2006, 17 (04) : 577 - 586
  • [37] Cryptanalysis of some multimedia encryption schemes
    Jakimoski, Goce
    Subbalakshmi, K. P.
    IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (03) : 330 - 338
  • [38] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
  • [39] Authenticated Encryption Schemes: A Systematic Review
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 14739 - 14766
  • [40] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319