期刊文献+

认证加密算法的研究

The Research of Authenticated Encryption Algorithm
在线阅读 下载PDF
导出
摘要 安全通信协议需要保证信息的两个安全属性:加密和认证。鉴于传统的认证加密方式早已不能满足人们对信息安全的要求,Bernstein等人在2013年1月发起了CAESAR竞赛,面向全球征集性能良好的认证加密算法。本文对认证加密算法的研究进展进行归纳总结,阐述了传统认证加密算法的设计方式和提交到CAESAR竞赛中的算法的特点,并以FASER和McMambo为例叙述了认证加密算法的分析方法,最后介绍了认证加密方案的发展前景。 Security protocols need to ensure the two security attributes of information:encryption and authentication.As traditional authenticated encryption modes can not meet the requirements for information security already,Bernstein et al.launched CAESAR competition at January 2013,which aimed to collect good performance authenticated encryption algorithms all over the world.This paper summarizes the progress of authenticated encryption algorithms,describes the design methods of traditional authenticated encryption modes and the characteristics of CAESAR candidates,then narrates the analysis methods by focusing on FASER and McMambo and finally discusses further research trend of authenticated encryption schemes in the future.
作者 宋海燕 郑秀林 付伊鹏 Song Haiyan;Zheng Xiulin;Fu Yipeng(Beijing Electronic Science and Technology Institute,Beijing 100070,China;Xi'Dian University,Xi'an Shaanxi 710071,China)
出处 《北京电子科技学院学报》 2017年第2期17-22,共6页 Journal of Beijing Electronic Science And Technology Institute
关键词 认证 加密 安全性分析 authentication encryption security analysis
  • 相关文献

参考文献1

二级参考文献55

  • 1CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. [EB/OL]http://competitions.cr.yp.to/caesar.hnnl.
  • 2Alizadeh J, Aref M 1k, Bagheri N. JHAE: An authenticated encryption mode based on JH [J]. IACR Cryptology ePrint Archive, 2014: 193-214, available from http://eprint.iacr.org.
  • 3Andreeva E, Bogdanov A. Parallelizable and authenticated online ciphers [C]. Sako K, Sarkar P (Eds.) ASIACRYPT 2013, 8269, 2013: 424-443.
  • 4Andreeva E, Bilgin B, Bogdanov A, et al. APE: authenticated permutation-based encryption for lightweight cryptography [J]. IACIZ Cryptology ePrint Archive, 2013(791), available from http://eprint.iacr.org.
  • 5Aoki K, Yasuda K. The security of the OCB mode of operation without the SPRP assumption [C]. ProvSec 2013, 8209, Springer-Verlag, 2013: 202-220.
  • 6Bertoni G, Daemen J. Permutation based encryption, authentication and authenticated encryption [J]. DIAC 2012, available from http://www. hyperelliptic.org.
  • 7Bellare M, Desai A, Jokipii E, et al. A Concrete Security treatment of symmetric encryption [C]. In Proceedings of the 38th symposiun on FOCS, IEEE, 1997: 394-403.
  • 8Bertoni G, Daemen J, Peeters M, et al. Duplexing the sponge: Single- pass authenticated encryption and other applications [C]. SAC 2011 , Springer, 2011: 320-337.
  • 9Bogdanov A, Mendel F, Regazzoni F. ALE: AES-based lightweight authenticated encryption [C]. In Fast Software Encryption, FSE 2013, Lecture Notes in Computer Science, Moriai S (ed.), Springer-Verlag, 2013.
  • 10Bellare M, Namprempre C. Authenticated encryption: Relations among notions and analysis of the genetic composition paradigm [C]. In Proc. ASIACRYPT, Okamoto T, Ed. Berlin, Germany: Springer-Verlag, 1976. 2000: 531-545.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部