scispace - formally typeset
Open AccessBook ChapterDOI

Single-Path Authenticated-Encryption Scheme Based on Universal Hashing

Reads0
Chats0
TLDR
In this paper, the authors proposed a single-path authenticated-encryption scheme with provable security, which is based on one of the well-known?-almost universal hash functions, the evaluation hash.
Abstract
An authenticated-encryption scheme is frequently used to provide a communication both with confidentiality and integrity. For stream ciphers, i.e., an encryption scheme using a cryptographic pseudo-random-number generator, this objective can be achieved by the simple combination of encryption and MAC generation. This naive approach, however, introduces the following drawbacks; the implementation is likely to require two scans of the data, and independent keys for the encryption and MAC generations must be exchanged. The single-path construction of an authenticated-encryption scheme for a stream cipher is advantageous in these two aspects but non-trivial design.In this paper we propose a single-path authenticated-encryption scheme with provable security. This scheme is based on one of the well-known ?-almost-universal hash functions, the evaluation hash. The encryption and decryption of the scheme can be calculated by single-path operation on a plaintext and a ciphertext. We analyze the security of the proposed scheme and give a security proof, which claims that the security of the proposed scheme can be reduced to that of an underlying PRNG in the indistinguishability from random bits. The security model we use, real-or-random, is one of the strongest notions amongst the four well-known notions for confidentiality, and an encryption scheme with real-or-random sense security can be efficiently reduced to the other three security notions. We also note that the security of the proposed scheme is tight.

read more

Content maybe subject to copyright    Report

Citations
More filters
Patent

Method and apparatus for symmetric-key encryption

TL;DR: A symmetric-key cryptographic technique capable of realizing both high-speed cryptographic processing having a high degree of parallelism, and alteration detection was proposed in this article, where the authors divide plaintext composed of redundancy data and a message to generate plaintext blocks each having a predetermined length.
Journal ArticleDOI

Authenticated Encryption Schemes: A Systematic Review

TL;DR: This study proposes a framework for classifying AE schemes and highlights past contributions to help researchers familiarize themselves with the current state and directions for future research in the area.
Patent

Method and apparatus for symmetric-key encryption

TL;DR: In this article, a symmetric-key cryptographic technique capable of realizing both high-speed cryptographic processing having a high degree of parallelism, and alteration detection was proposed, which can be used to realize both high speed cryptographic processing with high-level parallelism and alteration detecting.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI

Universal classes of hash functions

TL;DR: An input independent average linear time algorithm for storage and retrieval on keys that makes a random choice of hash function from a suitable class of hash functions.
Journal ArticleDOI

New hash functions and their use in authentication and set equality

TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.
Proceedings ArticleDOI

A concrete security treatment of symmetric encryption

TL;DR: This work studies notions and schemes for symmetric (ie. private key) encryption in a concrete security framework and gives four different notions of security against chosen plaintext attack, providing both upper and lower bounds, and obtaining tight relations.
Related Papers (5)