Authenticated encryption: Relations among notions and analysis of the generic composition paradigm

被引:199
作者
Bellare, Mihir [1 ]
Namprempre, Chanathip [2 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Thammasat Univ, Fac Engn, Pathum Thani 12121, Thailand
关键词
symmetric encryption; message authentication; authenticated encryption; concrete security;
D O I
10.1007/s00145-008-9026-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such schemes, namely integrity of plaintexts and integrity of ciphertexts, and relate them, when coupled with IND-CPA (indistinguishability under chosen-plaintext attack), to the standard notions of privacy IND-CCA and NM-CPA (indistinguishability under chosen-ciphertext attack and nonmalleability under chosen-plaintext attack) by presenting implications and separations between all notions considered. We then analyze the security of authenticated encryption schemes designed by "generic composition," meaning making black-box use of a given symmetric encryption scheme and a given MAC. Three composition methods are considered, namely Encrypt-and-MAC, MAC-then-encrypt, and Encrypt-then-MAC. For each of these and for each notion of security, we indicate whether or not the resulting scheme meets the notion in question assuming that the given symmetric encryption scheme is secure against chosen-plaintext attack and the given MAC is unforgeable under chosen-message attack. We provide proofs for the cases where the answer is "yes" and counter-examples for the cases where the answer is "no.".
引用
收藏
页码:469 / 491
页数:23
相关论文
共 52 条
  • [1] An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
  • [2] AN JH, 2002, LECT NOTES COMPUTER, V2332, P512
  • [3] [Anonymous], 4253 RFC
  • [4] [Anonymous], 4615 RFC
  • [5] [Anonymous], IETF STANDARDS
  • [6] [Anonymous], 1999, LNCS
  • [7] [Anonymous], LECT NOTES COMPUT SC
  • [8] Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718
  • [9] Bellare M, 2005, LECT NOTES COMPUT SC, V3621, P527
  • [10] Bellare M., 2004, ACM Transactions on Information and Systems Security, V7, P206, DOI 10.1145/996943.996945