scispace - formally typeset
Search or ask a question
Topic

Authenticated encryption

About: Authenticated encryption is a research topic. Over the lifetime, 1328 publications have been published within this topic receiving 25968 citations. The topic is also known as: AEAD & Authenticated Encryption with Associated Data.


Papers
More filters
Journal ArticleDOI
TL;DR: Their scheme cannot withstand the known plaintext-ciphertext attack because the intruder has ability to expose every message sent between the signer and the specified receiver.

3 citations

Proceedings ArticleDOI
16 Jun 2013
TL;DR: In this paper, a low cost solution for bitstream security by adding authentication and encryption to the reconfiguration process using Authenticated Encryption (AE) is presented: Counter with Cipher Block Chaining-Message Authentication Code (CCM), which utilizes Advanced Encryption Standard (AES) in Counter mode (CTR) for encryption.
Abstract: This paper describes low cost solution for bitstream security by adding authentication and encryption to the reconfiguration process using Authenticated Encryption (AE). Compact ASIC architecture for AE is presented: Counter with Cipher Block Chaining-Message Authentication Code (CCM). Proposed architecture utilizes Advanced Encryption Standard (AES) in Counter mode (CTR) for encryption. For authentication, AES in Cipher Block Chaining (CBC) is used. Therefore, one architecture of AES for both encryption and authentication decreases the consumed area. In addition, using AES in 32-bit enhances the compact architecture. Our design was evaluated by using a 90 nm CMOS standard cell library. The proposed architecture of CCM requires 0.045 mm2. In term of speed, CCM works with 407 Mbps. Our proposed architecture can be used efficiently for secure configuration of FPGAs.

3 citations

Patent
22 Dec 2020
TL;DR: In this article, techniques for securing data in a cloud storage are described. And a centralized security policy contains policy definitions which determine which files will share the wrapping-key, and a policy engine along with administrative tools enforce the security policy.
Abstract: Techniques are disclosed for securing data in a cloud storage. Plaintext files are stored as secured, encrypted files in the cloud. The ciphering scheme employs per-block authenticated encryption and decryption. A unique file-key is used to encrypt each file. The file-key is wrapped by authenticated encryption in a wrapping-key that may be shared between files. A centralized security policy contains policy definitions which determine which files will share the wrapping-key. Wrapping-keys are stored in a KMIP compliant key manager which may be backed by a hardware security module (HSM). File metadata is protected by a keyed-hash message authentication code (HMAC). A policy engine along with administrative tools enforce the security policy which also remains encrypted in the system. Various embodiments support blocks of fixed as well as variable sizes read/written from/to the cloud storage.

3 citations

Journal ArticleDOI
TL;DR: This paper falsifies the provable security claims of PMACx, PMAC2x, and SIVx by presenting concrete attacks, and shows that with the query complexity of O(2n/2), the schemes are all insecure.
Abstract: At CT-RSA 2017, List and Nandi proposed two variable input length pseudorandom functions (VI-PRFs) called PMACx and PMAC2x, and a deterministic authenticated encryption scheme called SIVx. These schemes use a tweakable block cipher (TBC) as the underlying primitive, and are provably secure up to the query complexity of 2n, where n denotes the block length of the TBC. In this paper, we falsify the provable security claims by presenting concrete attacks. We show that with the query complexity of O(2n/2), i.e., with the birthday complexity, PMACx, PMAC2x, and SIVx are all insecure.

3 citations

Proceedings ArticleDOI
10 Dec 2015
TL;DR: This paper presents a new encryption system for secure medical images transmission based on AES and RSA algorithms, which generates a unique password every new session of encryption.
Abstract: Data Security for end-end transmission is achieved by many different symmetric and asymmetric techniques for message confidentiality, message authentication and key exchange using transport layer security. This paper presents a new encryption system for secure medical images transmission. The hybrid encryption system is based on AES and RSA algorithms. AES is used for data confidentiality, the RSA is used for authentication and the integrity is assured by the basic function of correlation between adjacent pixels in the image. Our encryption system generates a unique password every new session of encryption. Several parameters were used for various tests of our analysis.

3 citations


Network Information
Related Topics (5)
Public-key cryptography
27.2K papers, 547.7K citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Encryption
98.3K papers, 1.4M citations
86% related
Hash function
31.5K papers, 538.5K citations
84% related
Authentication
74.7K papers, 867.1K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202319
202252
202167
2020109
2019111
201897