This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]
Index Terms
- RFC 5116: An Interface and Algorithms for Authenticated Encryption
Recommendations
Cryptanalysis of publicly verifiable authenticated encryption
InfoSecu '04: Proceedings of the 3rd international conference on Information securityMa and Chen proposed a new authenticated encryption scheme with public verifiability. This scheme requires less computational costs and communication overheads than the conventional signature-then-encryption approaches. In this paper, we show that the ...
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM
AbstractThere are three main approaches related to cryptanalysis of Authenticated Encryption with Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery attack), simulating the decryption oracle (plaintext ...
Highlights- For the first time, we introduce plaintext recovery and tag guessing attacks against a CAESAR winner.
Convertible multi-authenticated encryption scheme
A convertible authenticated encryption (CAE) scheme allows the signer to generate a valid authenticated ciphertext on his chosen message such that only the designated recipient can retrieve the message. Further, the recipient has the ability to convert ...