Authenticated Encryption: How Reordering Can Impact Performance

Provided by: University of Washington
Topic: Security
Format: PDF
"In this paper, the authors look at authenticated encryption schemes from a new perspective. As opposed to focusing solely on the ""Security"" implications of the different methods for constructing authenticated encryption schemes, they investigate the effect of the method used to construct an authenticated encryption scheme on the ""Performance"" of the construction. They show that, as opposed to the current NIST standard, by performing the authentication operation before the encryption operation, the computational efficiency of the construction can be increased, without affecting the security of the overall construction."

Find By Topic