Topic
Authenticated encryption
About: Authenticated encryption is a research topic. Over the lifetime, 1328 publications have been published within this topic receiving 25968 citations. The topic is also known as: AEAD & Authenticated Encryption with Associated Data.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: Their scheme cannot withstand the known plaintext-ciphertext attack because the intruder has ability to expose every message sent between the signer and the specified receiver.
3 citations
••
16 Jun 2013TL;DR: In this paper, a low cost solution for bitstream security by adding authentication and encryption to the reconfiguration process using Authenticated Encryption (AE) is presented: Counter with Cipher Block Chaining-Message Authentication Code (CCM), which utilizes Advanced Encryption Standard (AES) in Counter mode (CTR) for encryption.
Abstract: This paper describes low cost solution for bitstream security by adding authentication and encryption to the reconfiguration process using Authenticated Encryption (AE). Compact ASIC architecture for AE is presented: Counter with Cipher Block Chaining-Message Authentication Code (CCM). Proposed architecture utilizes Advanced Encryption Standard (AES) in Counter mode (CTR) for encryption. For authentication, AES in Cipher Block Chaining (CBC) is used. Therefore, one architecture of AES for both encryption and authentication decreases the consumed area. In addition, using AES in 32-bit enhances the compact architecture. Our design was evaluated by using a 90 nm CMOS standard cell library. The proposed architecture of CCM requires 0.045 mm2. In term of speed, CCM works with 407 Mbps. Our proposed architecture can be used efficiently for secure configuration of FPGAs.
3 citations
•
22 Dec 2020
TL;DR: In this article, techniques for securing data in a cloud storage are described. And a centralized security policy contains policy definitions which determine which files will share the wrapping-key, and a policy engine along with administrative tools enforce the security policy.
Abstract: Techniques are disclosed for securing data in a cloud storage. Plaintext files are stored as secured, encrypted files in the cloud. The ciphering scheme employs per-block authenticated encryption and decryption. A unique file-key is used to encrypt each file. The file-key is wrapped by authenticated encryption in a wrapping-key that may be shared between files. A centralized security policy contains policy definitions which determine which files will share the wrapping-key. Wrapping-keys are stored in a KMIP compliant key manager which may be backed by a hardware security module (HSM). File metadata is protected by a keyed-hash message authentication code (HMAC). A policy engine along with administrative tools enforce the security policy which also remains encrypted in the system. Various embodiments support blocks of fixed as well as variable sizes read/written from/to the cloud storage.
3 citations
••
TL;DR: This paper falsifies the provable security claims of PMACx, PMAC2x, and SIVx by presenting concrete attacks, and shows that with the query complexity of O(2n/2), the schemes are all insecure.
Abstract: At CT-RSA 2017, List and Nandi proposed two variable input length pseudorandom functions (VI-PRFs) called PMACx and PMAC2x, and a deterministic authenticated encryption scheme called SIVx. These schemes use a tweakable block cipher (TBC) as the underlying primitive, and are provably secure up to the query complexity of 2n, where n denotes the block length of the TBC. In this paper, we falsify the provable security claims by presenting concrete attacks. We show that with the query complexity of O(2n/2), i.e., with the birthday complexity, PMACx, PMAC2x, and SIVx are all insecure.
3 citations
••
10 Dec 2015
TL;DR: This paper presents a new encryption system for secure medical images transmission based on AES and RSA algorithms, which generates a unique password every new session of encryption.
Abstract: Data Security for end-end transmission is achieved by many different symmetric and asymmetric techniques for message confidentiality, message authentication and key exchange using transport layer security. This paper presents a new encryption system for secure medical images transmission. The hybrid encryption system is based on AES and RSA algorithms. AES is used for data confidentiality, the RSA is used for authentication and the integrity is assured by the basic function of correlation between adjacent pixels in the image. Our encryption system generates a unique password every new session of encryption. Several parameters were used for various tests of our analysis.
3 citations