Book ChapterDOI
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices
Megha Agrawal,Donghoon Chang,Somitra Kumar Sanadhya +2 more
- pp 451-468
Reads0
Chats0
TLDR
This paper proposes another way to handle a long ciphertext with a low buffer size by storing and releasing only one intermediate state, without releasing or storing any part of an unverified plaintext and without need of generating any intermediate tag.Abstract:
In authenticated encryption schemes, there are two techniques for handling long ciphertexts while working within the constraints of a low buffer size: Releasing unverified plaintext (RUP) or Producing intermediate tags (PIT). In this paper, in addition to these two techniques, we propose another way to handle a long ciphertext with a low buffer size by storing and releasing only one (generally, or only few) intermediate state, without releasing or storing any part of an unverified plaintext and without need of generating any intermediate tag. In this paper we explain this generalized technique using our new construction sp-AELM. sp-AELM is a sponge based authenticated encryption scheme that provides support for limited memory devices. We also provide its security proof for privacy and authenticity in an ideal permutation model, using a code based game playing framework. Furthermore, we also present two more variants of sp-AELM that serve the same purpose and are more efficient than sp-AELM.read more
Citations
More filters
Journal ArticleDOI
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
TL;DR: This paper provides the specification of As Con -128 and Ascon -128a, and specifies the hash function Ascon-Hash, and the extendable output function As Con-Xof, and complements the specification by providing a detailed overview of existing cryptanalysis and implementation results.
Selected Areas In Cryptography
TL;DR: The selected areas in cryptography is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can download it instantly.
Book ChapterDOI
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
TL;DR: This work revisits the principle of masking and introduces the tweakable Even-Mansour construction, which combines the advantages of word-oriented LFSR- and powering-up-based methods to realize highly efficient, constant-time masking functions.
Journal Article
CWC: A high-performance conventional authenticated encryption mode
TL;DR: CWC as mentioned in this paper is a new block cipher mode of operation for protecting both the privacy and the authenticity of encapsulated data, which is the first such mode having all five of the following properties: provable security, parallelizability, high performance in hardware and no intellectual property concerns.
Journal ArticleDOI
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
TL;DR: A new AE scheme called dAELM, which stands for deterministic authenticated encryption (DAE) scheme for low memory devices, is proposed, which is to use a session key to encrypt a message and share the session key with the user depending upon the verification of a tag.
References
More filters
Book ChapterDOI
A formal treatment of remotely keyed encryption
TL;DR: This work provides a formal framework in which to study the security of RKESs and gives anRKES that satisfies the formal security requirements and is efficient in that the amount of communication and computation required of the smart-card is independent of the input size.
Journal Article
How to Securely Release Unverified Plaintext in Authenticated Encryption
TL;DR: This work introduces the first formalization of the releasing unverified plaintext (RUP) setting, and introduces two notions of plaintext awareness in the symmetric-key setting, PA1 and PA2, and shows that they expose a new layer of security between IND-CPA and IND-CCA.
Selected Areas In Cryptography
TL;DR: The selected areas in cryptography is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can download it instantly.
Posted Content
EAX: A Conventional Authenticated-Encryption Mode.
TL;DR: EAX as mentioned in this paper is a block-cipher scheme for authenticated-encryption with associated data (AEAD) that is provably secure under a standard complexity-theoretic assumption.
Book ChapterDOI
NORX: Parallel and Scalable AEAD
TL;DR: NORX has a unique parallel architecture based on the monkeyDuplex construction, with an original domain separation scheme for a simple processing of header, payload and trailer data, and specifies a dedicated datagram to facilitate interoperability and avoid users the trouble of defining custom encoding and signalling.