Forgery attacks on ++AE authenticated encryption mode
Data(s) |
01/02/2016
|
---|---|
Resumo |
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct multiple forged messages. Our attack is deterministic and guaranteed to pass ++AE integrity check. We demonstrate the forgery attack using 128-bit AES as the underlying block cipher. Hence, ++AE is insecure as an authenticated encryption mode of operation. |
Formato |
application/pdf |
Identificador | |
Publicador |
ACM |
Relação |
http://eprints.qut.edu.au/92823/2/AISC_official_accepted_paper.pdf DOI:10.1145/2843043.2843355 Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward, & Kenneth Koon-Ho, Wong (2016) Forgery attacks on ++AE authenticated encryption mode. In ACSW '16 Proceedings of the Australasian Computer Science Week Multiconference, ACM, Canberra, A.C.T. |
Direitos |
Copyright 2016 ACM Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and t hat copies bear this notice and the full citation on the first p age. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ACE ’16 Canberra, ACT Australia Copyright 2016 ACM 978-1-4503-4042-7/16/02 ...$15.00. http://dx.doi.org/10.1145/2843043.2843355 |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Palavras-Chave | #080402 Data Encryption #Authenticated encryption #++AE #confidentiality #integrity #block cipher #forgery attack #symmetric encryption #CAESAR #AEAD |
Tipo |
Conference Paper |