Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm

Published: 04 September 2008 Publication History

Abstract

An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such schemes, namely integrity of plaintexts and integrity of ciphertexts, and relate them, when coupled with IND-CPA (indistinguishability under chosen-plaintext attack), to the standard notions of privacy IND-CCA and NM-CPA (indistinguishability under chosen-ciphertext attack and nonmalleability under chosen-plaintext attack) by presenting implications and separations between all notions considered. We then analyze the security of authenticated encryption schemes designed by “generic composition,” meaning making black-box use of a given symmetric encryption scheme and a given MAC. Three composition methods are considered, namely Encrypt-and-MAC, MAC-then-encrypt, and Encrypt-then-MAC. For each of these and for each notion of security, we indicate whether or not the resulting scheme meets the notion in question assuming that the given symmetric encryption scheme is secure against chosen-plaintext attack and the given MAC is unforgeable under chosen-message attack. We provide proofs for the cases where the answer is “yes” and counter-examples for the cases where the answer is “no.”

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Cryptology
Journal of Cryptology  Volume 21, Issue 4
September 2008
143 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 04 September 2008

Author Tags

  1. Authenticated encryption
  2. Concrete security
  3. Message authentication
  4. Symmetric encryption

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Tight Multi-user Security of Ascon and Its Large Key ExtensionInformation Security and Privacy10.1007/978-981-97-5025-2_4(57-76)Online publication date: 15-Jul-2024
  • (2024)Attribute-Based Keyed Fully Homomorphic EncryptionSecurity and Cryptography for Networks10.1007/978-3-031-71073-5_3(47-67)Online publication date: 11-Sep-2024
  • (2024)Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way FunctionsAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68394-7_4(93-125)Online publication date: 18-Aug-2024
  • (2024)Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through VerifiabilityAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58723-8_3(63-93)Online publication date: 26-May-2024
  • (2023)A Comprehensive Review of Lightweight Authenticated Encryption for IoT DevicesWireless Communications & Mobile Computing10.1155/2023/90719692023Online publication date: 21-Feb-2023
  • (2023)BLE-based secure tracking system proposalWireless Networks10.1007/s11276-023-03347-z30:6(5759-5770)Online publication date: 29-Apr-2023
  • (2023)Drone cybersecurity issues, solutions, trend insights and future perspectives: a surveyNeural Computing and Applications10.1007/s00521-023-08857-735:31(23063-23101)Online publication date: 31-Aug-2023
  • (2023)LucidiTEE: Scalable Policy-Based Multiparty Computation with FairnessCryptology and Network Security10.1007/978-981-99-7563-1_16(343-367)Online publication date: 30-Oct-2023
  • (2023)WrapQ: Side-Channel Secure Key Management for Post-quantum CryptographyPost-Quantum Cryptography10.1007/978-3-031-40003-2_23(637-657)Online publication date: 16-Aug-2023
  • (2023)Reconsidering Generic Composition: The Modes A10, A11 and A12 are InsecureInformation Security and Privacy10.1007/978-3-031-35486-1_8(157-176)Online publication date: 5-Jul-2023
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media