skip to main content
article

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm

Published: 04 September 2008 Publication History
  • Get Citation Alerts
  • Abstract

    An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such schemes, namely integrity of plaintexts and integrity of ciphertexts, and relate them, when coupled with IND-CPA (indistinguishability under chosen-plaintext attack), to the standard notions of privacy IND-CCA and NM-CPA (indistinguishability under chosen-ciphertext attack and nonmalleability under chosen-plaintext attack) by presenting implications and separations between all notions considered. We then analyze the security of authenticated encryption schemes designed by “generic composition,” meaning making black-box use of a given symmetric encryption scheme and a given MAC. Three composition methods are considered, namely Encrypt-and-MAC, MAC-then-encrypt, and Encrypt-then-MAC. For each of these and for each notion of security, we indicate whether or not the resulting scheme meets the notion in question assuming that the given symmetric encryption scheme is secure against chosen-plaintext attack and the given MAC is unforgeable under chosen-message attack. We provide proofs for the cases where the answer is “yes” and counter-examples for the cases where the answer is “no.”

    Cited By

    View all
    • (2024)Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through VerifiabilityAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58723-8_3(63-93)Online publication date: 26-May-2024
    • (2023)A Comprehensive Review of Lightweight Authenticated Encryption for IoT DevicesWireless Communications & Mobile Computing10.1155/2023/90719692023Online publication date: 21-Feb-2023
    • (2023)Drone cybersecurity issues, solutions, trend insights and future perspectives: a surveyNeural Computing and Applications10.1007/s00521-023-08857-735:31(23063-23101)Online publication date: 31-Aug-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Journal of Cryptology
    Journal of Cryptology  Volume 21, Issue 4
    September 2008
    143 pages

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 04 September 2008

    Author Tags

    1. Authenticated encryption
    2. Concrete security
    3. Message authentication
    4. Symmetric encryption

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through VerifiabilityAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58723-8_3(63-93)Online publication date: 26-May-2024
    • (2023)A Comprehensive Review of Lightweight Authenticated Encryption for IoT DevicesWireless Communications & Mobile Computing10.1155/2023/90719692023Online publication date: 21-Feb-2023
    • (2023)Drone cybersecurity issues, solutions, trend insights and future perspectives: a surveyNeural Computing and Applications10.1007/s00521-023-08857-735:31(23063-23101)Online publication date: 31-Aug-2023
    • (2023)LucidiTEE: Scalable Policy-Based Multiparty Computation with FairnessCryptology and Network Security10.1007/978-981-99-7563-1_16(343-367)Online publication date: 30-Oct-2023
    • (2023)WrapQ: Side-Channel Secure Key Management for Post-quantum CryptographyPost-Quantum Cryptography10.1007/978-3-031-40003-2_23(637-657)Online publication date: 16-Aug-2023
    • (2023)Reconsidering Generic Composition: The Modes A10, A11 and A12 are InsecureInformation Security and Privacy10.1007/978-3-031-35486-1_8(157-176)Online publication date: 5-Jul-2023
    • (2023)Subversion-Resilient Authenticated Encryption Without Random OraclesApplied Cryptography and Network Security10.1007/978-3-031-33491-7_17(460-483)Online publication date: 19-Jun-2023
    • (2023)On the Complete Non-malleability of the Fujisaki-Okamoto TransformApplied Cryptography and Network Security10.1007/978-3-031-33491-7_12(307-335)Online publication date: 19-Jun-2023
    • (2023)Context Discovery and Commitment AttacksAdvances in Cryptology – EUROCRYPT 202310.1007/978-3-031-30634-1_13(379-407)Online publication date: 23-Apr-2023
    • (2022)Computation on Encrypted Data Using Dataflow AuthenticationACM Transactions on Privacy and Security10.1145/351300525:3(1-36)Online publication date: 19-May-2022
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media