Forgery attacks on ++AE authenticated encryption mode


Autoria(s): Qahur Al Mahri, Hassan; Simpson, Leonie; Bartlett, Harry; Dawson, Edward; Kenneth Koon-Ho, Wong
Data(s)

01/02/2016

Resumo

In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct multiple forged messages. Our attack is deterministic and guaranteed to pass ++AE integrity check. We demonstrate the forgery attack using 128-bit AES as the underlying block cipher. Hence, ++AE is insecure as an authenticated encryption mode of operation.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/92823/

Publicador

ACM

Relação

http://eprints.qut.edu.au/92823/2/AISC_official_accepted_paper.pdf

DOI:10.1145/2843043.2843355

Qahur Al Mahri, Hassan, Simpson, Leonie, Bartlett, Harry, Dawson, Edward, & Kenneth Koon-Ho, Wong (2016) Forgery attacks on ++AE authenticated encryption mode. In ACSW '16 Proceedings of the Australasian Computer Science Week Multiconference, ACM, Canberra, A.C.T.

Direitos

Copyright 2016 ACM

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and t hat copies bear this notice and the full citation on the first p age. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ACE ’16 Canberra, ACT Australia Copyright 2016 ACM 978-1-4503-4042-7/16/02 ...$15.00. http://dx.doi.org/10.1145/2843043.2843355

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #080402 Data Encryption #Authenticated encryption #++AE #confidentiality #integrity #block cipher #forgery attack #symmetric encryption #CAESAR #AEAD
Tipo

Conference Paper