FOLLOWUS
College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China
Institute of Cyberspace Research, Zhejiang University, Hangzhou 310027, China
State Key Laboratory of Cryptology, Beijing 100878, China
Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou 310027, China
Institute of North Electronic Equipment, Beijing 100191, China
Fan ZHANG, E-mail: fanzhang@zju.edu.cn
Published:2018-12,
Received:17 September 2018,
Revised:17 December 2018,
Scan QR Code
FAN ZHANG, ZI-YUAN LIANG, BO-LIN YANG, et al. Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition. [J]. Frontiers of information technology & electronic engineering, 2018, 19(12): 1475-1499.
FAN ZHANG, ZI-YUAN LIANG, BO-LIN YANG, et al. Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition. [J]. Frontiers of information technology & electronic engineering, 2018, 19(12): 1475-1499. DOI: 10.1631/FITEE.1800576.
CAESAR竞赛是2013年由美国国家标准与技术研究院(NIST)资助的认证加密算法征集竞赛,旨在征集综合性能和安全性优于AES-GCM的认证加密算法,能够同时实现完整性和机密性。最后入围的算法可能被推荐至工业界并标准化。竞赛分3个轮次,第3轮在2018年结束。本文首先介绍CAESAR竞赛候选算法的设计要求和筛选进展,然后从设计结构和加密模式两方面对最后一轮候选算法进行归类,之后综述了候选算法的综合性能与安全性分析进展,最后探讨了认证加密算法的设计和分析研究趋势。
The Competition for Authenticated Encryption: Security
Applicability
and Robustness (CAESAR) supported by the National Institute of Standards and Technology (NIST) is an ongoing project calling for submissions of authenticated encryption (AE) schemes. The competition itself aims at enhancing both the design of AE schemes and related analysis. The design goal is to pursue new AE schemes that are more secure than advanced encryption standard with Galois/counter mode (AES-GCM) and can simultaneously achieve three design aspects: security
applicability
and robustness. The competition has a total of three rounds and the last round is approaching the end in 2018. In this survey paper
we first introduce the requirements of the proposed design and the progress of candidate screening in the CAESAR competition. Second
the candidate AE schemes in the final round are classified according to their design structures and encryption modes. Third
comprehensive performance and security evaluations are conducted on these candidates. Finally
the research trends of design and analysis of AE for the future are discussed.
CAESAR竞赛认证加密算法分组密码序列密码哈希函数安全性评估
CAESAR competitionAuthenticated cipherBlock cipherStream cipherHash functionSecurity evaluation
KM Abdellatif, , , R Chotin-Avot, , , H Mehrez. . AES-GCM and AEGIS: efficient and high speed hardware implementations. . J Signal Proc Syst, , 2017. . 88((1):):1--12. . DOI:10.1007/s11265-016-1104-yhttp://doi.org/10.1007/s11265-016-1104-y..
M Agrawal, , , D Chang, , , SK Sanadhya. . A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. . Int J Appl Cryptogr, , 2017. . 3((3):):236--261. . DOI:10.1504/IJACT.2017.086223http://doi.org/10.1504/IJACT.2017.086223..
Mahri HQ Al, , , L Simpson, , , H Bartlett, , , 等. . Tweaking generic OTR to avoid forgery attacks. . Proc 6th Int Conf on Applications and Techniques in Information Security, , 2016. . p.41--53. . DOI:10.1007/978-981-10-2741-3_4http://doi.org/10.1007/978-981-10-2741-3_4..
Mahri HQ Al, , , L Simpson, , , H Bartlett, , , 等. . A fault-based attack on AEZ v4.2. . Proc IEEE Trustcom/BigDataSE/ICESS, , 2017. . p.634--641. . DOI:10.1109/trustcom/bigdatase/icess.2017.294http://doi.org/10.1109/trustcom/bigdatase/icess.2017.294..
E Andreeva, , , A Bogdanov, , , A Luykx, , , 等. . ES-COPA v.2. . CAESAR Submission, , 2015. ..
E Andreeva, , , A Bogdanov, , , A Luykx, , , 等. . AES-COPA v.1.. . Submission to the CAESAR competition, , 2016a. ..
E Andreeva, , , A Bogdanov, , , N Datta. . ELmD v2.1. . CAESAR Third Round Submission, , 2016b. ..
T Ashur, , , M Eichlseder, , , MM Lauridsen, , , 等. . Cryptanalysis of MORUS. . Int Conf on the Theory and Application of Cryptology and Information Security, , 2018. . p.35--64. . ..
JP Aumasson, , , P Jovanovic, , , S Neves. . Analysis of NORX: investigating differential and rotational properties. . Proc 3rd Int Conf on Cryptology and Information Security in Latin America, , 2014a. . p.306--324. . DOI:10.1007/978-3-319-16295-9_17http://doi.org/10.1007/978-3-319-16295-9_17..
JP Aumasson, , , P Jovanovic, , , S Neves. . NORX: parallel and scalable AEAD. . Proc 19th European Symp on Research in Computer Security, , 2014b. . p.19--36. . DOI:10.1007/978-3-319-11212-1_2http://doi.org/10.1007/978-3-319-11212-1_2..
JP Aumasson, , , P Jovanovic, , , S Neves. . NORX v3.0.. . Submission to CAESAR (2016), , 2015. ..
N Bagheri, , , T Huang, , , KT Jia, , , 等. . Cryptanalysis of reduced NORX. . Proc 23rd Int Conf on Fast Software Encryption, , 2016. . p.554--574. . DOI:10.1007/978-3-662-52993-5_28http://doi.org/10.1007/978-3-662-52993-5_28..
S Banik, , , A Bogdanov, , , K Minematsu. . Low-area hardware implementations of CLOC, SILC and AES-OTR. . IEEE Int Symp on Hardware Oriented Security and Trust, , 2016. . p.71--74. . DOI:10.1109/HST.2016.7495559http://doi.org/10.1109/HST.2016.7495559..
A Bay, , , O Ersoy, , , F Karakoç. . Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm. . Proc 22nd Int Conf on the Theory and Application of Cryptology and Information Security, , 2016. . p.354--368. . DOI:10.1007/978-3-662-53887-6_13http://doi.org/10.1007/978-3-662-53887-6_13..
M Bellare, , , C Namprempre. . Authenticated encryption: relations among notions and analysis of the generic composition paradigm. . J Cryptol, , 2008. . 21((4):):469--491. . DOI:10.1007/s00145-008-9026-xhttp://doi.org/10.1007/s00145-008-9026-x..
M Bellare, , , P Rogaway, , , D Wagner. . A conventional authenticated-encryption mode. . Manuscript, , 2003. ..
M Bellare, , , P Rogaway, , , T Spies. . The FFX mode of operation for format-preserving encryption. . NIST Submission, , 2010. ..
F Berti, , , F Koeune, , , O Pereira, , , 等. . Leakage-resilient and misuse-resistant authenticated encryption. . IACR Cryptology ePrint Archive: Report 2016/996, , 2016. ..
G Bertoni, , , J Daemen, , , M Peeters, , , 等. . Duplexing the sponge: single-pass authenticated encryption and other applications. . Int Workshop on Selected Areas in Cryptography, , 2011. . p.320--337. . DOI:10.1007/978-3-642-28496-0_19http://doi.org/10.1007/978-3-642-28496-0_19..
G Bertoni, , , J Daemen, , , M Peeters, , , 等. . Keyak v2. . CAESAR Submission, , 2015. ..
G Berton, , , J Daemen, , , M Peeters, , , 等. . Ketje v2. . CAESAR Submission, , 2016. ..
R Bhaumik, , , M Nandi. . Improved security for OCB3. . roc 23rd Int Conf on the Theory and Application of Cryptology and Information Security, , 2017. . p.638--666. . DOI:10.1007/978-3-319-70697-9_22http://doi.org/10.1007/978-3-319-70697-9_22..
WQ Bi, , , Z Li, , , XY Dong, , , 等. . Conditional cube attack on round-reduced River Keyak. . Des Code Cryptogr, , 2017. . 86((6):):1295--1310. . DOI:10.1007/s10623-017-0396-7http://doi.org/10.1007/s10623-017-0396-7..
A Biryukov, , , A Udovenko, , , V Velichkov. . Analysis of the NORX Core Permutation. . IACR Cryptology ePrint Archive: Report 2017/034, , 2017. ..
X Bonnetain. . Quantum key-recovery on full AEZ. . Proc 24th Int Conf on Selected Areas in Cryptography, , 2017. . p.394--406. . DOI:10.1007/978-3-319-72565-9_20http://doi.org/10.1007/978-3-319-72565-9_20..
L Bossuet, , , N Datta, , , C Mancillas-Lóopez, , , 等. . ELmD: a pipelineable authenticated encryption and its hardware implementation. . IEEE Trans Comp, , 2016. . 65((11):):3318--3331. . DOI:10.1109/TC.2016.2529618http://doi.org/10.1109/TC.2016.2529618..
R Bost, , , O Sanders. . Trick or tweak: on the (in)security of OTR's tweaks. . Proc 22nd Int Conf on the Theory and Application of Cryptology and Information Security, , 2016. . p.333--353. . DOI:10.1007/978-3-662-53887-6_12http://doi.org/10.1007/978-3-662-53887-6_12..
C Chaigneau, , , H Gilbert. . Is AEZ v4.1 sufficiently resilient against key-recovery attacks?. . IACR Trans Symmetr Cryptol, , 2016. . 2016((1):):114--133. . DOI:10.13154/tosc.v2016.i1.114-133http://doi.org/10.13154/tosc.v2016.i1.114-133..
C Chaigneau, , , F Thomas, , , H Gilbert. . Full key-recovery on ACORN in nonce-reuse and decryption-misuse settings. . Posed on the Crypto-Competition Mailing List, , 2015. ..
C Cid, , , T Huang, , , T Peyrin, , , 等. . A security analysis of deoxys and its internal tweakable block ciphers. . IACR Trans Symmetr Cryptol, , 2017. . 2017((3):):73--107. . DOI:10.13154/tosc.v2017.i3.73-107http://doi.org/10.13154/tosc.v2017.i3.73-107..
P Clift. . Hardware Implementation of Offset Codebook Mode3 (OCB3). . MS Thesis, California State University, Sacramento, USA, , 2014. ..
DK Dalai, , , D Roy. . A state recovery attack on ACORN-v1 and ACORN-v2. . Proc 11th Int Conf on Network and System Security, , 2017. . p.332--345. . DOI:10.1007/978-3-319-64701-2_24http://doi.org/10.1007/978-3-319-64701-2_24..
S Das, , , S Maitra, , , W Meier. . Higher order differential analysis of NORX. . IACR Cryptology ePrint Archive: Report 2015/186, , 2015. ..
S Deshpande, , , K Gaj. . Analysis and inner-round pipelined implementation of selected parallelizable CAESAR competition candidates. . Euromicro Conf on Digital System Design, , 2017. . p.274--282. . DOI:10.1109/DSD.2017.80http://doi.org/10.1109/DSD.2017.80..
P Dey, , , RS Rohit, , , A Adhikari. . Full key recovery of ACORN with a single fault. . J Inform Secur Appl, , 2016a. . 2957--64. . DOI:10.1016/j.jisa.2016.03.003http://doi.org/10.1016/j.jisa.2016.03.003..
P Dey, , , RS Rohit, , , S Sarkar, , , 等. . Differential fault analysis on Tiaoxin and AEGIS family of ciphers.. . Proc 4th Int Symp on Security in Computing and Communication, , 2016b. . p.74--86. . DOI:10.1007/978-981-10-2738-3_7http://doi.org/10.1007/978-981-10-2738-3_7..
I Dinur, , , P Morawiecki, , , J Pieprzyk, , , 等. . Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. . Proc 34th Annual Int Conf on the Theory and Applications of Cryptographic Techniques, , 2015. . p.733--761. . DOI:10.1007/978-3-662-46800-5_28http://doi.org/10.1007/978-3-662-46800-5_28..
C Dobraunig, , , M Eichlseder, , , T Korak, , , 等. . Practical fault attacks on authenticated encryption modes for AES. . IACR Cryptology ePrint Archive: Report 2016/616, , 2016a. ..
C Dobraunig, , , M Eichlseder, , , T Korak, , , 等. . Statistical fault attacks on nonce-based authenticated encryption schemes. . Proc 22nd Int Conf on the Theory and Application of Cryptology and Information Security, , 2016b. . p.369--395. . DOI:10.1007/978-3-662-53887-6_14http://doi.org/10.1007/978-3-662-53887-6_14..
C Dobraunig, , , M Eichlseder, , , F Mendel, , , 等. . Ascon v1.2. . Submission to the CAESAR Competition, , 2016c. ..
C Dobraunig, , , M Eichlseder, , , S Mangard, , , 等. . ISAP-towards side-channel secure authenticated encryption. . IACR Trans Symmetr Cryptol, , 2017. . 2017((1):):80--105. . DOI:10.13154/tosc.v2017.i1.80-105http://doi.org/10.13154/tosc.v2017.i1.80-105..
XY Dong, , , Z Li, , , XY Wang, , , 等. . Cube-like attack on round-reduced initialization of Ketje Sr. . IACR Trans Symmetr Cryptol, , 2017. . 2017((1):):259--280. . DOI:10.13154/tosc.v2017.i1.259-280http://doi.org/10.13154/tosc.v2017.i1.259-280..
AD Dwivedi, , , M Klouček, , , P Morawiecki, , , 等. . SAT-based cryptanalysis of authenticated ciphers from the CAESAR competition. . IACR Cryptology ePrint Archive: Report 2016/1053, , 2016. ..
AD Dwivedi, , , P Morawiecki, , , S Wójtowicz. . Differential and rotational cryptanalysis of round-reduced MORUS. . Proc 14th Int Joint Conf on e-Business and Telecommunications, , 2017. . p.275--284. . DOI:10.5220/0006411502750284http://doi.org/10.5220/0006411502750284..
AD Dwivedi, , , M Klouček, , , P Morawiecki, , , 等. . SAT-based cryptanalysis of authenticated ciphers from the CAESAR competition. . IACR Cryptology ePrint Archive: Report 2016/1053, , 2016. ..
M Dworkin. . Recommendation for block cipher modes of operation: methods for format-preserving encryption. . NIST Special Publication 800-38G, , 2016. ..
L Ertaul, , , KL Sravya, , , N Sanka. . Implementation of authenticated encryption algorithm offset code book (OCB). . Proc Int Conf on Wireless Networks, , 2016. . p.78--84. . ..
F Farahmand, , , W Diehl, , , A Abdulgadir, , , 等. . Improved lightweight implementations of CAESAR authenticated ciphers. . Cryptology ePrint Archive: Report 2018/573, , 2018. ..
C Forler, , , E List, , , S Lucks, , , 等. . Reforgeability of authenticated encryption schemes. . Proc 22nd Australasian Conf on Information Security and Privacy, , 2017. . p.19--37. . DOI:10.1007/978-3-319-59870-3_2http://doi.org/10.1007/978-3-319-59870-3_2..
T Fuhr, , , G Leurent, , , V Suder. . Collision attacks against CAESAR candidates. . Proc 21st Int Conf on the Theory and Application of Cryptology and Information Security, , 2014. . p.510--532. . DOI:10.1007/978-3-662-48800-3_21http://doi.org/10.1007/978-3-662-48800-3_21..
T Fuhr, , , M Naya-Plasencia, , , Y Rotella. . State-recovery attacks on modified Ketje Jr. . IACR Trans Symmetr Cryptol, , 2018. . 2018((1):):29--56. . DOI:10.13154/tosc.v2018.i1.29-56http://doi.org/10.13154/tosc.v2018.i1.29-56..
VDP Gligor. . Extended cipher block chaining encryption. . Submission to NIST, , 2016. ..
VD Gligor, , , P Donescu. . Fast encryption and authentication: XCBC encryption and XECB authentication modes. . Int Workshop on Fast Software Encryption, , 2001. . p.92--108. . ..
H Groβ, , , E Wenger, , , C Dobraunig, , , 等. . Suit up!-Made-to-measure hardware implementations of ASCON. . Euromicro Conf on Digital System Design, , 2015. . p.645--652. . DOI:10.1109/DSD.2015.14http://doi.org/10.1109/DSD.2015.14..
H Gross, , , E Wenger, , , C Dobraunig, , , 等. . ASCON hardware implementations and side-channel evaluation. . Microprocess Microsyst, , 2017. . 52470--479. . DOI:10.1016/j.micpro.2016.10.006http://doi.org/10.1016/j.micpro.2016.10.006..
S Halevi. . EME*: extending EME to handle arbitrary-length messages with associated data. . Proc 5th Int Conf on Cryptology in India, , 2004. . p.315--327. . DOI:10.1007/978-3-540-30556-9_25http://doi.org/10.1007/978-3-540-30556-9_25..
S Halevi, , , P Rogaway. . A parallelizable enciphering mode. . Cryptographers' Track at the RSA Conf, , 2004. . p.292--304. . DOI:10.1007/978-3-540-24660-2_23http://doi.org/10.1007/978-3-540-24660-2_23..
H Hellström, , , H StreamSec. . Propagating cipher feedback mode. . Proc 2nd NIST Modes of Operation Workshop, , 2001. ..
VT Hoang, , , T Krovetz, , , P Rogaway. . AEZ v1: authenticated-encryption by enciphering. . CAESAR 1st Round, , 2014. ..
VT Hoang, , , T Krovetz, , , P Rogaway. . Robust authenticated-encryption AEZ and the problem that it solves. . Proc 34th Annual Int Conf on the Theory and Applications of Cryptographic Techniques, , 2015. . p.15--44. . DOI:10.1007/978-3-662-46800-5_2http://doi.org/10.1007/978-3-662-46800-5_2..
VT Hoang, , , T Krovetz, , , P Rogaway. . AEZ v4. 2: authenticated encryption by enciphering.. . CAESAR Submission, , 2016. ..
T Huang, , , HJ Wu. . Distinguishing attack on NORX permutation. . IACR Trans Symmetr Cryptol, , 2018. . 2018((1):):57--73. . DOI:10.13154/tosc.v2018.i1.57-73http://doi.org/10.13154/tosc.v2018.i1.57-73..
S Hwang, , , C Lee. . Padding Oracle attack on block cipher with CBC|CBC-double mode of operation using the BOZ-PAD. . J Soc e-Buss Stud, , 2015. . 20((1):):89--97. . DOI:10.7838/jsebs.2015.20.1.089http://doi.org/10.7838/jsebs.2015.20.1.089..
T Iwata, , , K Minematsu, , , J Guo, , , 等. . SILC: simple lightweight CFB. . Submission to the CAESAR Competition, , 2014. ..
J Jean, , , I Nikolić, , , T Peyrin, , , 等. . Deoxys v1.41. . Submitted to CAESAR, , 2016. ..
RJ Josh, , , S Sarkar. . Some observations on ACORN v1 and Trivia-SC. . Lightweight Cryptography Workshop, , 2015. . p.20--21. . ..
P Jovanovic, , , A Luykx, , , B Mennink. . Beyond 2c/2 security in sponge-based authenticated encryption modes. . Proc 20th Int Conf on the Theory and Application of Cryptology and Information Security, , 2014. . p.85--104. . DOI:10.1007/978-3-662-45611-8_5http://doi.org/10.1007/978-3-662-45611-8_5..
CS Jutla. . Encryption modes with almost free message integrity. . Int Conf on the Theory and Applications of Cryptographic Techniques, , 2001. . p.529--544. . ..
CS Jutla. . Integrity aware cipher block chaining. . Submission to NIST, , 2016a. ..
CS Jutla. . Integrity aware parallelizable mode. . Submission to NIST, , 2016b. ..
PK Kaushal, , , R Sobti, , , G Geetha. . Random Key Chaining (RKC): AES mode of operation. . Int J Appl Inform Syst, , 2012. . 1((5):):39--45. . DOI:10.5120/ijais12-450184http://doi.org/10.5120/ijais12-450184..
T Kohno. . Carter Wegman (authentication) with Counter. . (encryption), , 2003. . http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/cwc/cwc-spec.pdfhttp://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/cwc/cwc-spec.pdf, , ..
M Kotegawa, , , K Iwai, , , H Tanaka, , , 等. . Optimization of hardware implementations with high-level synthesis of authenticated encryption. . Bull Netw Comput Syst Soft, , 2016. . 5((1):):26--33. . ..
S Koteshwara, , , A Das, , , KK Parhi. . FPGA implementation and comparison of AES-GCM and Deoxys authenticated encryption schemes. . IEEE Int Symp on Circuits and Systems, , 2017. . p.1--4. . DOI:10.1109/ISCAS.2017.8050315http://doi.org/10.1109/ISCAS.2017.8050315..
T Krovetz, , , P Rogaway. . OCB (v1.1). . 2016. . https://competitions.cr.yp.to/round3/ocbv11.pdfhttps://competitions.cr.yp.to/round3/ocbv11.pdf, , ..
S Kumar, , , J Haj-Yahya, , , A Chattopadhyay. . Efficient hardware accelerator for NORX authenticated encryption. . IEEE Int Symp on Circuits and Systems, , 2018. . p.1--5. . DOI:10.1007/978-3-319-16745-9_21http://doi.org/10.1007/978-3-319-16745-9_21..
F Lafitte, , , L Lerman, , , O Markowitch, , , 等. . SAT-based cryptanalysis of ACORN. . IACR Cryptology ePrint Archive: Report 2016/521, , 2016. ..
Z Li, , , XY Dong, , , XY Wang. . Conditional cube attack on round-reduced ASCON. . IACR Trans Symmetr Cryptol, , 2017. . 2017((1):):175--202. . DOI:10.13154/tosc.v2017.i1.175-202http://doi.org/10.13154/tosc.v2017.i1.175-202..
M Liskov, , , RL Rivest, , , D Wagner. . Tweakable block ciphers.. . Proc 22ndAnnual Int Cryptology Conf, , 2002. . p.31--46. . DOI:10.1007/3-540-45708-9_3http://doi.org/10.1007/3-540-45708-9_3..
M Liskov, , , RL Rivest, , , D Wagner. . Tweakable block ciphers. . J Cryptol, , 2011. . 24((3):):588--613. . DOI:10.1007/s00145-010-9073-yhttp://doi.org/10.1007/s00145-010-9073-y..
FB Liu, , , FM Liu. . Universal forgery and key recovery attacks: application to FKS, FKD and Keyak. . Cryptology ePrint Archive: Report 2017/691, , 2017. ..
MC Liu, , , DD Lin. . Cryptanalysis of lightweight authenticated cipher ACORN. . Posed on the Crypto-Competition Mailing List, , 2014. ..
JQ Lu. . On the security of the COPA and marble authenticated encryption algorithms against (almost) universal forgery attack. . IACR Cryptology ePrint Archive: Report 2015/079, , 2015. ..
JQ Lu. . Almost universal forgery attacks on the COPA and marble authenticated encryption algorithms. . Proc ACM Asia Conf on Computer and Communications Security, , 2017. . p.789--799. . DOI:10.1145/3052973.3052981http://doi.org/10.1145/3052973.3052981..
DSN Mary, , , AT Begum. . An algorithm for moderating DoS attack in web based application. . Int Conf on Technical Advancements in Computers and Communications, , 2017. . p.26--31. . DOI:10.1109/ICTACC.2017.17http://doi.org/10.1109/ICTACC.2017.17..
D McGrew, , , J Viega. . The Galois/counter mode of operation (GCM). . Submission to NIST Modes of Operation Process, , 2004. ..
KA McKay, , , LE Bassham, , , MS Turan, , , 等. . Report on lightweight cryptography. . NIST, , 2017. ..
A Mehrdad, , , F Moazami, , , H Soleimany. . Impossible differential cryptanalysis on deoxys-BC-256. . Cryptology ePrint Archive, Report 2018/048, , 2018. ..
B Mennink. . Weak keys for AEZ, and the external key padding attack. . Cryptographers' Track at the RSA Conf, , 2017. . p.223--237. . DOI:10.1007/978-3-319-52153-4_13http://doi.org/10.1007/978-3-319-52153-4_13..
B Mennink, , , R Reyhanitabar, , , D Vizár. . Security of full-state keyed sponge and duplex: applications to authenticated encryption. . Int Conf on the Theory and Application of Cryptology and Information Security, , 2015. . p.465--489. . DOI:10.1007/978-3-662-48800-3_19http://doi.org/10.1007/978-3-662-48800-3_19..
M Meyers, , , J Daemen, , , L Batina. . Side channel protected Keyak on ARM cortex-M4. . 2017. . http://www.cs.ru.nl/bachelors-theses/2017/Martin_Meyers_4497899_Side_channel_protected_Keyak_on_ARM_Cortex-M4.pdfhttp://www.cs.ru.nl/bachelors-theses/2017/Martin_Meyers_4497899_Side_channel_protected_Keyak_on_ARM_Cortex-M4.pdf, , ..
A Mileva, , , V Dimitrova, , , V Velichkov. . Analysis of the authenticated cipher MORUS (v1). . Proc 2nd Int Conf on Cryptography and Information Security in the Balkans, , 2015. . p.45--59. . DOI:10.1007/978-3-319-29172-7_4http://doi.org/10.1007/978-3-319-29172-7_4..
B Minaud. . Linear biases in AEGIS keystream. . Proc 21st Int Conf on Selected Areas in Cryptography, , 2014. . p.290--305. . DOI:10.1007/978-3-319-13051-4_18http://doi.org/10.1007/978-3-319-13051-4_18..
K Minematsu. . Parallelizable rate-1 authenticated encryption from pseudorandom functions. . Proc 33rd Annual Int Conf on the Theory and Applications of Cryptographic Techniques, , 2014. . p.275--292. . DOI:10.1007/978-3-642-55220-5_16http://doi.org/10.1007/978-3-642-55220-5_16..
K Minematsu. . AES-OTR v3. . Japan Submission to CAESAR, NEC Corporation, , 2016. ..
K Minematsu, , , J Guo, , , E Kobayashi. . CLOC and SILC. . 2016. . https://competitions.cr.yp.to/round3/clocsilcv3.pdfhttps://competitions.cr.yp.to/round3/clocsilcv3.pdf, , ..
A Moise, , , E Beroset, , , T Phinney, , , 等. . EAX' Cipher Mode. . NIST, , 2011. ..
P Morawiecki, , , J Pieprzyk, , , M Straus, , , 等. . Applications of key recovery cube-attack-like. . IACR Cryptology ePrint Archive: Report 2015/1009, , 2015. ..
M Nandi. . Revisiting security claims of XLS and COPA. . IACR Cryptology ePrint Archive: Report 2015/444, , 2015. ..
I Nikolić. . Tiaoxin v2.1. . CAESAR Third Round Submission, , 2016. ..
O Pereira, , , FX Standaert, , , S Vivek. . Leakage-resilient authentication and encryption from symmetric cryptographic primitives. . Proc 22nd ACM SIGSAC Conf on Computer and Communications Security,, , 2015. . p.96--108. . DOI:10.1145/2810103.2813626http://doi.org/10.1145/2810103.2813626..
T Peyrin, , , SM Sim, , , L Wang, , , 等. . Cryptanalysis of JAMBU. . Proc 22nd Int Workshop on Fast Software Encryption, , 2015. . p.264--281. . DOI:10.1007/978-3-662-48116-5_13http://doi.org/10.1007/978-3-662-48116-5_13..
F Pub. . DES Modes of Operation. . 1980. . https://csrc.nist.gov/publications/detail/fips/81/archive/1980-12-02https://csrc.nist.gov/publications/detail/fips/81/archive/1980-12-02, , ..
F Recacha. . Input and output chaining. . Submission to NIST, , 2016. ..
M Rivain, , , E Prouff. . Provably secure higher-order masking of AES. . Proc 12th Int Workshop on Cryptographic Hardware and Embedded Systems, , 2010. . p.413--427. . DOI:10.1007/978-3-642-15031-9_28http://doi.org/10.1007/978-3-642-15031-9_28..
P Rogaway. . Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. . Proc 10th Int Conf on the Theory and Application of Cryptology and Information Security, , 2004. . p.16--31. . DOI:10.1007/978-3-540-30539-2_2http://doi.org/10.1007/978-3-540-30539-2_2..
P Rogaway. . Offset codebook. . Submission to NIST, , 2016. ..
P Rogaway, , , T Shrimpton. . The SIV mode of operation for deterministic authenticated-encryption (key wrap) and misuse-resistant nonce-based authenticated-encryption. . 2007. . http://web.cs.ucdavis.edu/~ularogaway/papers/siv.pdfhttp://web.cs.ucdavis.edu/~ularogaway/papers/siv.pdf, , ..
P Rogaway, , , M Bellare, , , J Black, , , 等. . OCB Mode. . IACR Cryptology ePrint Archive, , 2001. ..
J Rott. . Intel® Advanced Encryption Standard Instructions (AES-NI). . Technical Report, Intel, , 2010. ..
DB Roy, , , A Chakraborti, , , D Chang, , , 等. . Fault based almost universal forgeries on CLOC and SILC. . Proc 6th Int Conf on Security, Privacy, and Applied Cryptography Engineering, , 2016. . p.66--86. . DOI:10.1007/978-3-319-49445-6_4http://doi.org/10.1007/978-3-319-49445-6_4..
DB Roy, , , A Chakraborti, , , D Chang, , , 等. . Two efficient fault-based attacks on CLOC and SILC. . J Hardw Syst Secur, , 2017. . 1((3):):252--268. . DOI:10.1007/s41635-017-0022-1http://doi.org/10.1007/s41635-017-0022-1..
H Sadeghi, , , J Alizadeh. . A forgery attack on AES-OTR. . 2014. ..
I Salam, , , L Simpson, , , H Bartlett, , , 等. . Investigating cube attacks on the authenticated encryption stream cipher MORUS. . IEEE Trustcom/BigDataSE/ICESS, , 2017. . p.961--966. . DOI:10.1109/trustcom/bigdatase/icess.2017.337http://doi.org/10.1109/trustcom/bigdatase/icess.2017.337..
I Salam, , , Mahri HQ Al, , , L Simpson, , , 等. . Fault attacks on Tiaoxin-346. . Proc Australasian Computer Science Week Multiconf, Article 5, , 2018a. . DOI:10.1145/3167918.3167940http://doi.org/10.1145/3167918.3167940..
I Salam, , , L Simpson, , , H Bartlett, , , 等. . Fault attacks on the authenticated encryption stream cipher MORUS. . Cryptography, , 2018b. . 2((1):):Article 4DOI:10.3390/cryptography2010004http://doi.org/10.3390/cryptography2010004..
MI Salam, , , H Bartlett, , , E Dawson, , , 等. . Investigating cube attacks on the authenticated encryption stream cipher ACORN. . Proc 6th Int Conf on Applications and Techniques in Information Security, , 2016a. . p.15--26. . DOI:10.1007/978-981-10-2741-3_2http://doi.org/10.1007/978-981-10-2741-3_2..
MI Salam, , , KKH Wong, , , H Bartlett, , , 等. . Finding state collisions in the authenticated encryption stream cipher ACORN. . Proc Australasian Computer Science Week Multiconf, Article 36, , 2016b. ..
N Samwel, , , J Daemen. . DPA on hardware implementations of Ascon and Keyak. . Proc Computing Frontiers Conf, , 2017. . p.415--424. . DOI:10.1145/3075564.3079067http://doi.org/10.1145/3075564.3079067..
Y Sasaki. . Improved related-tweakey boomerang attacks on deoxys-BC. . Progress in Cryptology-AFRICACRYPT, , 2018. . p.87--106. . DOI:10.1007/978-3-319-89339-6_6http://doi.org/10.1007/978-3-319-89339-6_6..
RC Schroeppel, , , WE Anderson, , , CL Beaver, , , 等. . Cipher-state (CS) mode of operation for AES. . Submission to NIST, , 2004. ..
TR Shi, , , J Guan, , , JZ Li, , , 等. . Improved collision cryptanalysis of authenticated cipher MORUS. . Proc 2nd Int Conf on Artificial Intelligence and Industrial Engineering, , 2016. . p.429--432. . DOI:10.2991/aiie-16.2016.98http://doi.org/10.2991/aiie-16.2016.98..
TR Shi, , , CH Jin, , , J Guan. . Collision attacks against AEZ-PRF for authenticated encryption AEZ. . China Commun, , 2018. . 15((2):):46--53. . DOI:10.1109/CC.2018.8300271http://doi.org/10.1109/CC.2018.8300271..
A Siddhanti, , , S Sarkar, , , S Maitra, , , 等. . Differential fault attack on grain v1, ACORN v3 and lizard. . Proc 7th Int Conf on Security, Privacy, and Applied Cryptography Engineering, , 2017. . p.247--263. . DOI:10.1007/978-3-319-71501-8_14http://doi.org/10.1007/978-3-319-71501-8_14..
L Song, , , J Guo, , , DP Shi, , , 等. . New MILP modeling: improved conditional cube attacks on Keccak-based constructions. . Cryptology ePrint Archive: Report 2017/1030, , 2017. ..
K Stoffelen. . Intrinsic Side-Channel Analysis Resistance and Efficient Masking. . MS Thesis, Radboud University, Nijmegen, the Netherlands, , 2015. ..
ZL Sun, , , P Wang, , , LT Zhang. . Collision attacks on variant of OCB mode and its series. . Proc 8th Int Conf on Information Security and Cryptology, , 2012. . p.216--224. . DOI:10.1007/978-3-642-38519-3_14http://doi.org/10.1007/978-3-642-38519-3_14..
T Unterluggauer, , , M Werner, , , S Mangard. . MEAS: memory encryption and authentication secure against side-channel attacks. . J Cryptogr Eng, , 2018. . 2018((1):):1--22. . DOI:10.1007/s13389-018-0180-2http://doi.org/10.1007/s13389-018-0180-2..
S Vaudenay, , , D Vizár. . Under pressure: security of Caesar candidates beyond their guarantees. . Cryptology ePrint Archive: Report 2017/1147, , 2017. ..
N Veyrat-Charvillon, , , M Medwed, , , S Kerckhof, , , 等. . Shuffling against side-channel attacks: a comprehensive study with cautionary note. . Proc 18th Int Conf on the Theory and Application of Cryptology and Information Security, , 2012. . p.740--757. . DOI:10.1007/978-3-642-34961-4_44http://doi.org/10.1007/978-3-642-34961-4_44..
G Wang, , , HY Zhang, , , FM Liu. . Security proof of JAMBU under nonce respecting and nonce misuse cases. . Cryptology ePrint Archive: Report 2017/831, , 2017. ..
HR Wang, , , H He, , , WZ Zhang. . Demadroid: object reference graph-based malware detection in Android. . Secur Commun Netw, Article 7 064 131, , 2018. . DOI:10.1155/2018/7064131http://doi.org/10.1155/2018/7064131..
MN Wegman, , , JL Carter. . New hash functions and their use in authentication and set equality. . J Comp Syst Sci, , 1981. . 22((3):):265--279. . DOI:10.1016/0022-0000(81)90033-7http://doi.org/10.1016/0022-0000(81)90033-7..
J Wetzels, , , W Bokslag. . Sponges and engines: an introduction to Keccak and Keyak. . 2015. . http://arxiv.org/abs/1510.02856http://arxiv.org/abs/1510.02856, , ..
D Whiting, , , R Housley, , , N Ferguson. . Counter with CBC-MAC (CCM). . Network Working Group, , 2003. ..
HJ Wu. . ACORN: a lightweight authenticated cipher (v3). . Candidate for the CAESAR Competition, , 2016. ..
HJ Wu, , , T Huang. . JAMBU lightweight authenticated encryption mode and AES-JAMBU. . CAESAR Competition Proposal, , 2014. ..
HJ Wu, , , T Huang. . The authenticated cipher MORUS (v2). . 2016. . https://competitions.cr.yp.to/round3/morusv2.pdfhttps://competitions.cr.yp.to/round3/morusv2.pdf, , ..
HJ Wu, , , B Preneel. . AEGIS: a fast authenticated encryption algorithm. . Proc 20th Int Conf on Selected Areas in Cryptography, , 2013. . p.185--201. . DOI:10.1007/978-3-662-43414-7_10http://doi.org/10.1007/978-3-662-43414-7_10..
L Xue. . A Novel Approach for Flexray Protocol with Confidentiality and Authenticity. . MS Thesis, National University of Singapore, Singapore, , 2016. ..
P Yalla, , , JP Kaps. . Evaluation of the CAESAR hardware API for lightweight implementations. . Int Conf on ReConFigurable Computing and FPGAs (ReConFig), , 2017. . p.1--6. . DOI:10.1109/RECONFIG.2017.8279790http://doi.org/10.1109/RECONFIG.2017.8279790..
P Zhang, , , J Guan, , , JZ Li, , , 等. . Research on the confusion and diffusion properties of the initialization of MORUS. . J Cryptol Res, , 2015. . 2((6):):536--548. . DOI:10.13868/j.cnki.jcr.000100http://doi.org/10.13868/j.cnki.jcr.000100..
P Zhang, , , P Wang, , , HG Hu. . The INT-RUP security of OCB with intermediate (Parity) checksum. . IACR Cryptology ePrint Archive: Report 2016/1059, , 2016. ..
T Zhang, , , Q Li, , , CS Zhang, , , 等. . Current trends in the development of intelligent unmanned autonomous systems. . Front Inform Technol Electron Eng, , 2017. . 18((1):):68--85. . DOI:10.1631/FITEE.1601650http://doi.org/10.1631/FITEE.1601650..
WZ Zhang, , , X Li, , , NX Xiong, , , 等. . Android platform-based individual privacy information protection system. . Pers Ubiq Comp, , 2016. . 20((6):):875--884. . DOI:10.1007/s00779-016-0966-0http://doi.org/10.1007/s00779-016-0966-0..
XJ Zhang, , , XT Feng, , , DD Lin. . Fault attack on the authenticated cipher ACORN v2. . Secur Commun Netw, Article 3 834 685, , 2017. . DOI:10.1155/2017/3834685http://doi.org/10.1155/2017/3834685..
XJ Zhang, , , XT Feng, , , DD Lin. . Fault attack on ACORN v3. . Comp J, , 2018. . 61((8):):1166--1179. . DOI:10.1093/comjnl/bxy044http://doi.org/10.1093/comjnl/bxy044..
Publicity Resources
Related Articles
Related Author
Related Institution