scispace - formally typeset
Search or ask a question
Topic

Authenticated encryption

About: Authenticated encryption is a research topic. Over the lifetime, 1328 publications have been published within this topic receiving 25968 citations. The topic is also known as: AEAD & Authenticated Encryption with Associated Data.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors examined how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine.
Abstract: We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do not require evaluation of the inverse of the underlying PRF. In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field. The latter fitting the use case of many secret-sharing based MPC engines. In doing this conversion we examine the associated security proofs of PMAC and OTR, and show that they carry over to this new setting.

10 citations

Proceedings ArticleDOI
01 Oct 2016
TL;DR: The Advanced Encryption Standard (AES) was chosen as one of the encryption algorithms for testing as it is authorized by the National Security Agency (NSA) and various modes of AES, including Galois/Counter Mode (GCM) and Counter with Cipher Block Chaining Message Authentication Code (CCM), were analyzed within the swarm architecture.
Abstract: Large Unmanned Aerial Vehicle (UAV) swarms are a nascent technology promising useful military and civilian solutions to logistical problems. Securing data communications within the swarm is essential to accomplishing swarm objectives. The Naval Postgraduate School has successfully demonstrated the launch, flight and landing of 50 UAVs. The communications architecture to support a UAV swarm is unique. This paper details the practical challenges of creating a secure communications channel in the swarm. The Advanced Encryption Standard (AES) was chosen as one of the encryption algorithms for testing as it is authorized by the National Security Agency (NSA). Various modes of AES, including Galois/Counter Mode (GCM) and Counter with Cipher Block Chaining Message Authentication Code (CCM), were analyzed within the swarm architecture. The impact of these authenticated encryption algorithms on network capacity and processor performance is presented. In addition to AES, ChaCha20-Poly1305, another type of authenticated encryption scheme was studied. It was found to be the better solution for securing the swarm if classified data is not being handled or created.

10 citations

Journal ArticleDOI
TL;DR: The ongoing Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is described, and the different candidates of the competition with respect to a variety of metrics of relevance to constrained systems, including their memory footprints are compared.
Abstract: In this article, the authors study the problem of efficient authenticated encryption algorithms for use in embedded devices. In particular, they describe the ongoing Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR), and compare the different candidates of the competition with respect to a variety of metrics of relevance to constrained systems, including their memory footprints. —Alvaro Cardenas, University of Texas at Dallas

10 citations

Patent
18 Dec 2015
TL;DR: In this paper, a metadata producer stores the encrypted I/O data in a DMA buffer and the authentication tag in an authentication tag queue, and a metadata consumer decrypts the encrypted data from the buffer and determines whether it is authentic using the authenticated tag from the tag queue.
Abstract: Technologies for authenticity assurance for I/O data include a computing device with a cryptographic engine and one or more I/O controllers. A metadata producer of the computing device performs an authenticated encryption operation on I/O data to generate encrypted I/O data and an authentication tag. The metadata producer stores the encrypted I/O data in a DMA buffer and the authentication tag in an authentication tag queue. A metadata consumer decrypts the encrypted I/O data from the DMA buffer and determines whether the encrypted I/O data is authentic using the authentication tag from the authentication tag queue. For input, the metadata producer may be embodied as the cryptographic engine and the metadata consumer may be embodied as a trusted software component. For output, the metadata producer may be embodied as the trusted software component and the metadata consumer may be embodied as the cryptographic engine. Other embodiments are described and claimed.

10 citations


Network Information
Related Topics (5)
Public-key cryptography
27.2K papers, 547.7K citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Encryption
98.3K papers, 1.4M citations
86% related
Hash function
31.5K papers, 538.5K citations
84% related
Authentication
74.7K papers, 867.1K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202319
202252
202167
2020109
2019111
201897