Cryptanalysis of the OKH Authenticated Encryption Scheme

Provided by: Chinese Academy of Sciences
Topic: Security
Format: PDF
Authenticated Encryption (AE) schemes achieve the security functions of message authentication codes and that of encryption schemes at the same time, i.e. authenticity and privacy. Simply speaking, authenticity guarantees that the ciphertext is really delivered from the sender and not modified by the adversary during the transmission. Privacy guarantees that the adversary cannot gain any information (except the length) about plaintext from the view of ciphertext. Due to its wide applications, during the past few years, considerable effort has been made to construct AE schemes, e.g. IAPM, OCB, CCM, EAX, CWC and GCM.

Find By Topic