Matches in SemOpenAlex for { <https://semopenalex.org/work/W83672586> ?p ?o ?g. }
- W83672586 abstract "Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation.However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms.This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows.The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors.The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack.The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions.The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks.We establish the conditions under which the model is susceptible to forgery and side-channel attacks." @default.
- W83672586 created "2016-06-24" @default.
- W83672586 creator A5019739499 @default.
- W83672586 date "2012-01-01" @default.
- W83672586 modified "2023-09-23" @default.
- W83672586 title "Analysis of stream cipher based authenticated encryption schemes" @default.
- W83672586 cites W118210125 @default.
- W83672586 cites W149964843 @default.
- W83672586 cites W1507507680 @default.
- W83672586 cites W1513645801 @default.
- W83672586 cites W1520563459 @default.
- W83672586 cites W1521783451 @default.
- W83672586 cites W1549228503 @default.
- W83672586 cites W1554090281 @default.
- W83672586 cites W1560023496 @default.
- W83672586 cites W1572961947 @default.
- W83672586 cites W1575820409 @default.
- W83672586 cites W1628219518 @default.
- W83672586 cites W1660562555 @default.
- W83672586 cites W1729681995 @default.
- W83672586 cites W1832305045 @default.
- W83672586 cites W1856020901 @default.
- W83672586 cites W1866349918 @default.
- W83672586 cites W1979198062 @default.
- W83672586 cites W1981205339 @default.
- W83672586 cites W1988965754 @default.
- W83672586 cites W1991047075 @default.
- W83672586 cites W1996360405 @default.
- W83672586 cites W2012646342 @default.
- W83672586 cites W2035476608 @default.
- W83672586 cites W2074886859 @default.
- W83672586 cites W2083781982 @default.
- W83672586 cites W2105733530 @default.
- W83672586 cites W2126098610 @default.
- W83672586 cites W2127909992 @default.
- W83672586 cites W2128546931 @default.
- W83672586 cites W2131300413 @default.
- W83672586 cites W2134518741 @default.
- W83672586 cites W2136910978 @default.
- W83672586 cites W2152723805 @default.
- W83672586 cites W2154271831 @default.
- W83672586 cites W2161517294 @default.
- W83672586 cites W2161550346 @default.
- W83672586 cites W2165883295 @default.
- W83672586 cites W2172632525 @default.
- W83672586 cites W2283840417 @default.
- W83672586 cites W2404493879 @default.
- W83672586 cites W2610322461 @default.
- W83672586 cites W2615409614 @default.
- W83672586 cites W2912322578 @default.
- W83672586 cites W2971450452 @default.
- W83672586 cites W464457 @default.
- W83672586 cites W52763954 @default.
- W83672586 cites W84914348 @default.
- W83672586 hasPublicationYear "2012" @default.
- W83672586 type Work @default.
- W83672586 sameAs 83672586 @default.
- W83672586 citedByCount "1" @default.
- W83672586 countsByYear W836725862016 @default.
- W83672586 crossrefType "dissertation" @default.
- W83672586 hasAuthorship W83672586A5019739499 @default.
- W83672586 hasConcept C106544461 @default.
- W83672586 hasConcept C148730421 @default.
- W83672586 hasConcept C178489894 @default.
- W83672586 hasConcept C38652104 @default.
- W83672586 hasConcept C41008148 @default.
- W83672586 hasConcept C60448319 @default.
- W83672586 hasConcept C92950451 @default.
- W83672586 hasConcept C96675983 @default.
- W83672586 hasConceptScore W83672586C106544461 @default.
- W83672586 hasConceptScore W83672586C148730421 @default.
- W83672586 hasConceptScore W83672586C178489894 @default.
- W83672586 hasConceptScore W83672586C38652104 @default.
- W83672586 hasConceptScore W83672586C41008148 @default.
- W83672586 hasConceptScore W83672586C60448319 @default.
- W83672586 hasConceptScore W83672586C92950451 @default.
- W83672586 hasConceptScore W83672586C96675983 @default.
- W83672586 hasLocation W836725861 @default.
- W83672586 hasOpenAccess W83672586 @default.
- W83672586 hasPrimaryLocation W836725861 @default.
- W83672586 hasRelatedWork W1804712121 @default.
- W83672586 hasRelatedWork W2026409191 @default.
- W83672586 hasRelatedWork W2222575769 @default.
- W83672586 hasRelatedWork W2312982458 @default.
- W83672586 hasRelatedWork W2395215665 @default.
- W83672586 hasRelatedWork W2616947473 @default.
- W83672586 hasRelatedWork W2907362105 @default.
- W83672586 hasRelatedWork W2946191247 @default.
- W83672586 hasRelatedWork W2950225802 @default.
- W83672586 hasRelatedWork W2953115559 @default.
- W83672586 hasRelatedWork W2953375689 @default.
- W83672586 hasRelatedWork W2964436214 @default.
- W83672586 hasRelatedWork W2992534413 @default.
- W83672586 hasRelatedWork W3024924297 @default.
- W83672586 hasRelatedWork W3083333321 @default.
- W83672586 hasRelatedWork W3095502234 @default.
- W83672586 hasRelatedWork W3177186565 @default.
- W83672586 hasRelatedWork W1490561533 @default.
- W83672586 hasRelatedWork W2237070602 @default.
- W83672586 hasRelatedWork W2879330072 @default.