Filters








92,701 Hits in 2.5 sec

Indifferentiable Authenticated Encryption [chapter]

Manuel Barbosa, Pooya Farshim
2018 Lecture Notes in Computer Science  
We study Authenticated Encryption with Associated Data (AEAD) from the viewpoint of composition in arbitrary (single-stage) environments.  ...  We investigate this question for authenticated encryption and ask if, and how efficiently, can indifferentiable AEAD schemes be built. Our contributions are as follows.  ...  Definitions: We define ideal authenticated-encryption as one that is indifferentiable from a random keyed injection.  ... 
doi:10.1007/978-3-319-96884-1_7 fatcat:r7x75bhhkbfzvdbwexayieynq4

Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes [chapter]

Virgil D. Gligor, Pompiliu Donescu
2002 Lecture Notes in Computer Science  
We present the eXtended Ciphertext Block Chaining (XCBC) and the eXtended Electronic Codebook (XECB) encryption schemes or modes of encryption that can detect encrypted-message forgeries with high probability  ...  We also present the XECB message authentication (XECB-MAC) modes that have all the operational properties of the XOR-MAC modes (e.g., fully parallel and pipelined operation, incremental updates, and out-oforder  ...  They provide authentication of encrypted messages in real-time, without the need for an additional processing path over the input data.  ... 
doi:10.1007/3-540-45473-x_8 fatcat:e5fu7kvyp5fxzexrbfak73s4pe

Authenticated encryption in SSH

Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
Unfortunately, the current SSH authenticated encryption mechanism is insecure.  ...  We believe that our new notions of privacy and integrity for encryption schemes with stateful decryption algorithms will be of independent interest.  ...  authenticated encryption scheme.  ... 
doi:10.1145/586110.586112 dblp:conf/ccs/BellareKN02 fatcat:44fxpb2jmbeydai74tdi5xfcta

Authenticated encryption in SSH

Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
Unfortunately, the current SSH authenticated encryption mechanism is insecure.  ...  We believe that our new notions of privacy and integrity for encryption schemes with stateful decryption algorithms will be of independent interest.  ...  authenticated encryption scheme.  ... 
doi:10.1145/586111.586112 fatcat:4nndki2vibav7no6v26vym3x24

Authenticated On-Line Encryption [chapter]

Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette
2004 Lecture Notes in Computer Science  
In this paper, we investigate the authenticated encryption paradigm, and its security against blockwise adaptive adversaries, mounting chosen ciphertext attacks on on-the-fly cryptographic devices.  ...  Finally, we propose an instantiation of this scheme, using the encrypted CBC-MAC algorithm, a secure pseudorandom number generator and the Delayed variant of the CBC encryption scheme.  ...  Authenticated Encryption in the Blockwise Setting To construct an authenticated encryption scheme, the classical method is to use an encryption scheme along with a Message Authentication Code (MAC).  ... 
doi:10.1007/978-3-540-24654-1_11 fatcat:cfwqbclbbrc23hnuzbfhvrru2a

Disk-enabled authenticated encryption

Kevin Butler, Stephen McLaughlin, Patrick McDaniel
2010 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)  
Providing authenticated encryption, or simultaneous encryption with integrity information, is important to protect data at rest.  ...  ., FDE drives) may provide a solution for authenticated encryption, storing security metadata within the drive itself to eliminate dependences on other parts of the system.  ...  Section II describes the challenges of providing authenticated encryption. Section III describes how we simulate authenticated encryption operations.  ... 
doi:10.1109/msst.2010.5496979 dblp:conf/mss/ButlerMM10 fatcat:gjznu64jezhqzjdunl7tupebpm

Password-authenticated searchable encryption

Liqun Chen, Kaibin Huang, Mark Manulis, Venkkatesh Sekar
2020 International Journal of Information Security  
AbstractWe introduce Password Authenticated Searchable Encryption (PASE), a novel searchable encryption scheme where a single human-memorizable password can be used to outsource (encrypted) data with associated  ...  In this paper, we model the functionality of PASE along with two security requirements (indistinguishability against chosen keyword attacks and authentication) and propose an efficient direct construction  ...  Conclusion Password-Authenticated Searchable Encryption (PASE) introduced in this paper is a new concept for searchable encryption where the search over encrypted keywords can be performed solely with  ... 
doi:10.1007/s10207-020-00524-5 fatcat:cmn3qdntbrbq3jrgdvkumpaecm

Quantum Authentication and Encryption with Key Recycling [article]

Serge Fehr, Louis Salvail
2017 arXiv   pre-print
took place: the entire key can be securely re-used for encrypting new messages as long as no attack is detected.  ...  We propose an information-theoretically secure encryption scheme for classical messages with quantum ciphertexts that offers detection of eavesdropping attacks, and re-usability of the key in case no eavesdropping  ...  If no physically authenticated channel is available, then the authenticated feedback can actually be done very easily: Alice appends a random token to the message she communicates to Bob in encrypted form  ... 
arXiv:1610.05614v3 fatcat:73mosbi4ejgejccfgafw3uz32u

Interactive Encryption and Message Authentication [chapter]

Yevgeniy Dodis, Dario Fiore
2014 Lecture Notes in Computer Science  
Public-Key Encryption (PKE) and Message Authentication (PKMA, aka as digital signatures) are fundamental cryptographic primitives.  ...  It is well known that no non-interactive signature (resp. encryption) scheme can be deniable (resp. forward-secure), since the signature (resp. ciphertext) can later "serve as an evidence of the sender's  ...  The protocol is based on an old idea of realizing public key authentication via CCA-secure encryption and message authentication codes.  ... 
doi:10.1007/978-3-319-10879-7_28 fatcat:c77p7phskrht3kiamsbh7h2y54

Authenticated-encryption with associated-data

Phillip Rogaway
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
We formalize and investigate this authenticated-encryption with associated-data (AEAD) problem.  ...  For the general setting we study two simple ways to turn an authenticated-encryption scheme that does not support associated-data into one that does: nonce stealing and ciphertext translation.  ...  An authenticated-encryption scheme (an AEscheme), or simply an encryption scheme, is a three-tuple Π = (K, E, D).  ... 
doi:10.1145/586123.586125 fatcat:53i6nhgqbjdirb5unh7ma4dkrq

A Blockcipher Based Authentication Encryption [chapter]

Rashed Mazumder, Atsuko Miyaji, Chunhua Su
2016 Lecture Notes in Computer Science  
Authentication encryption (AE) is a procedure that satisfies both privacy and authenticity on the data.  ...  It doesn't need decryption oracle in the symmetric encryption module of the AE. The proposed construction satisfies padding free encryption.  ...  Authentication Encryption The authentication encryption is noted as AE. Generally, there are two algorithms of encryption and decryption (MAC included for both the algorithms) under the AE.  ... 
doi:10.1007/978-3-319-45507-5_8 fatcat:fhi53b4t6nbdhie3txl75nhwju

Authenticated-encryption with associated-data

Phillip Rogaway
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
We formalize and investigate this authenticated-encryption with associated-data (AEAD) problem.  ...  For the general setting we study two simple ways to turn an authenticated-encryption scheme that does not support associated-data into one that does: nonce stealing and ciphertext translation.  ...  An authenticated-encryption scheme (an AEscheme), or simply an encryption scheme, is a three-tuple Π = (K, E, D).  ... 
doi:10.1145/586110.586125 dblp:conf/ccs/Rogaway02 fatcat:sanmlcvzvnfgndnhsguoyawke4

Authentication by Encrypted Negative Password

Jobin Thomas Alummoottil, Rony Tom
2021 Zenodo  
This encrypted negative password system uses the technique in which inside the passwords are first hashed and then converted to negative password and eventually encrypted and stored within the database  ...  This Encrypted Negative Password device still can resist the precomputation attacks.  ...  The value of the negative password is then encrypted and saved in the authentication data database.  ... 
doi:10.5281/zenodo.5105434 fatcat:25yulz47anamvlt2qth3yr7zuy

Secure Fully Homomorphic Authenticated Encryption

Jeongsu Kim, Aaram Yun
2021 IEEE Access  
Our new security notion is a unified definition for data privacy and authenticity of homomorphic authenticated encryption.  ...  However, due to its special functionality, the security notions of the homomorphic authenticated encryption is somewhat complicated and the construction of fully homomorphic authenticated encryption has  ...  HOMOMORPHIC AUTHENTICATED ENCRYPTION Here we describe the syntax of the homomorphic authenticated encryption. Definition 1 (MDHAE).  ... 
doi:10.1109/access.2021.3100852 fatcat:v6gaczdjlncm5lpynnwpo6wk7e

Key Rotation for Authenticated Encryption [chapter]

Adam Everspaugh, Kenneth Paterson, Thomas Ristenpart, Sam Scott
2017 Lecture Notes in Computer Science  
Moreover, BLMR do not yet target or achieve any kind of authenticated encryption goal, a must for practical use. Our contributions.  ...  This paper presents a systematic study of updatable Authenticated Encryption (AE). We provide a set of security notions that strengthen those in prior work.  ...  Authenticated Encryption In the following constructions we make use of authenticated encryption (AE) schemes which we define here. Definition 4 (Authenticated encryption).  ... 
doi:10.1007/978-3-319-63697-9_4 fatcat:sgkbieidhje3jpx4xpn6673k3i
« Previous Showing results 1 — 15 out of 92,701 results