scispace - formally typeset
Open Access

The Design and Analysis of Message Authentication and Authenticated Encryption Schemes

TLDR
This thesis studies message authentication and authenticated encryption algorithms, which are symmetric-key solutions to providing data integrity and confidentiality, and introduces a new design, LightMAC, which enables keys to be used longer than typically possible and an existing construction, PMAC, is analyzed in depth for its potential to provide more security than what was commonly thought.
Abstract
Awareness of the significance of securing communication and data has increased dramatically due to the countless examples showing that systems with little or no protection can and will be attacked. Lack of adoption, or improper use of strong cryptographic techniques could be attributed to the fact that cryptographic solutions are not efficient enough, impose impractical constraints on their use, or their analysis does not align with how they are used in practice. This thesis studies message authentication and authenticated encryption algorithms, which are symmetric-key solutions to providing data integrity and confidentiality. A formal study is performed of how security degrades when authenticated encryption algorithms are implemented in environments where theoretical assumptions might not be met, the so-called nonce abuse and release of unverified plaintext settings. Designs for authenticated encryption schemes are analyzed, including our designs COPA and COBRA, while keeping efficiency constraints in mind. Additionally, limits imposed by constrained environments, which commonly appear in applications for the internet of things, are considered, and discussed in the context of message authentication algorithms. A new design is introduced, LightMAC, which enables keys to be used longer than typically possible, and an existing construction, PMAC, is analyzed in depth for its potential to provide more security than what was commonly thought.

read more

Citations
More filters
Journal Article

A provable-security treatment of the key-wrap problem

TL;DR: It is suggested that key-wrap's goal is security in the sense of deterministic authenticated-encryption (DAE), and it is shown that a DAE scheme with a vector-valued header, such as SIV, directly realizes this goal.
Journal Article

Nonce-based symmetric encryption

TL;DR: This work investigates an alternative syntax for an encryption scheme, where the encryption process e is a deterministic function that surfaces an initialization vector (IV) that is guaranteed to be a nonce-something that takes on a new value with every message one encrypts.
Journal Article

Multi-Key Security: The Even-Mansour Construction Revisited

TL;DR: In this paper, Even and Mansour's Even-Mansour construction has been shown to offer similar security as an ideal block cipher with the same block and key size, under multiple independent keys.
Journal Article

New paradigms for constructing symmetric encryption schemes secure against chosen-ciphertext attack

TL;DR: In this paper, the authors proposed schemes that are provably secure against adaptive chosen ciphertext attack (CCA) and yet every string is a valid ciphertext, and they have a smaller ciphertext expansion than any other scheme known to be secure against CCA.
Posted Content

A New Paradigm for Collision-free Hashing: Incrementality at Reduced Cost.

TL;DR: In this paper, the authors present a new paradigm for the design of collision-free hash functions, and derive several specific functions from this paradigm, all of which use a standard hash function, assumed ideal and some algebraic operations.
References
More filters
Book

The Design of Rijndael: AES - The Advanced Encryption Standard

TL;DR: The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.
Book ChapterDOI

PRESENT: An Ultra-Lightweight Block Cipher

TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.
Journal Article

PRESENT: An Ultra-Lightweight Block Cipher

TL;DR: In this paper, the authors describe an ultra-lightweight block cipher, present, which is suitable for extremely constrained environments such as RFID tags and sensor networks, but it is not suitable for very large networks such as sensor networks.
Journal ArticleDOI

New hash functions and their use in authentication and set equality

TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.
Related Papers (5)