Fact-checked by Grok 2 weeks ago
References
-
[1]
RFC 5116 - An Interface and Algorithms for Authenticated EncryptionThis document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms.
-
[2]
[PDF] Authenticated Encryption - Purdue Computer ScienceAuthenticated Encryption – Informal Definition. A symmetric encryption scheme is said to offer Authenticated Encryption security if: A chosen plaintext ...
-
[3]
None### Summary of GCM as an Authenticated Encryption Mode
-
[4]
RFC 5288 - AES Galois Counter Mode (GCM) Cipher Suites for TLSThis memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms.
- [5]
-
[6]
[PDF] Authenticated Encryption: Relations among notions and analysis of ...Jul 14, 2007 · Abstract. An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity.
-
[7]
Proposal to Revise SP 800-38A | CSRCMar 21, 2022 · ... padding oracle attack on SSL/TLS. Eventually, this led to recommendations to use authenticated encryption modes in protocols. For example ...
-
[8]
[PDF] Authenticated-Encryption with Associated-DataSep 20, 2002 · Authenticated-encryption with associated-data (AEAD) protects both the privacy and authenticity of a message, including additional data like a ...
-
[9]
Authenticated Encryption: Relations among notions and analysis of ...An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity.
-
[10]
[PDF] Unforgeable Encryption and Chosen Ciphertext Secure Modes of ...A trivial solution to the problem of unforgeability is to share two keys—one for encryption and one for authentication (e.g., using a MAC). Also, various.
-
[11]
[PDF] The Rise of Authenticated EncryptionMay 28, 2018 · Thm [Jonsson 2002]. CCM is provably secure if E is a good PRP. Page ... The Rise of Authenticated Encryption.
-
[12]
On the Security of CTR + CBC-MAC - SpringerLinkFeb 17, 2003 · We analyze the security of the CTR + CBC-MAC (CCM) encryption mode. This mode, proposed by Doug Whiting, Russ Housley, and Niels Ferguson, combines the CTR (“ ...
-
[13]
[PDF] The NESSIE Project: Towards New Cryptographic Algorithms - COSICThe NESSIE call includes a request for a broad set of algorithms providing date confidentiality, data authentication, and entity authentication. These algo ...
-
[14]
SP 800-38C, Recommendation for Block Cipher Modes of OperationThis Recommendation defines a mode of operation, called Counter with Cipher Block Chaining-Message Authentication Code (CCM), for a symmetric key block cipher ...
-
[15]
SP 800-38D, Recommendation for Block Cipher Modes of OperationThis Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC.<|separator|>
-
[16]
RFC 8446 - The Transport Layer Security (TLS) Protocol Version 1.3This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet.
-
[17]
ISO/IEC 19772:2009 - Authenticated encryptionISO/IEC 19772:2009 specifies six methods for authenticated encryption, ie defined ways of processing a data string with the following security objectives.
-
[18]
The AEGIS Family of Authenticated Encryption AlgorithmsThis document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and AEGIS-256X AES-based authenticated encryption algorithms designed for high-performance ...Missing: post- | Show results with:post-
-
[19]
Key Committing Security Analysis of AEGIS - Cryptology ePrint ArchiveSep 30, 2023 · In this work, we assess the key committing security of AEGIS, which emerged as a winner in the Competition for Authenticated Encryption: Security, ...
-
[20]
[PDF] Nonce-Based Symmetric EncryptionWe believe that a nonce-based formalization is especially desir- able when constructing an encryption scheme for a cryptographic standard: not knowing how the ...
-
[21]
[PDF] Key Committing AEADs - Cryptology ePrint ArchiveAbstract. This note describes some methods for adding a key commit- ment property to a generic (nonce-based) AEAD scheme. We analyze.
-
[22]
Partitioning Oracle Attacks - USENIXWe build a practical partitioning oracle attack that quickly recovers passwords from Shadowsocks proxy servers. We also survey early implementations of the ...
-
[23]
[PDF] Partitioning Oracle Attacks - IACRAs a result, cryptogra- phers now advocate the use of authenticated encryption with associated data (AEAD) schemes and CCA-secure public key encryption. There ...
-
[24]
[PDF] On Committing Authenticated-EncryptionAbstract. We provide a strong definition for committing authenticated- encryption (cAE), as well as a framework that encompasses earlier and weaker definitions ...
-
[25]
[PDF] Rugged PRPs, Nonce-Set AEAD, and Order-Resilient ChannelsThe stronger notion of misuse-resistant AEAD MRAE is defined analogously by replacing the re- quirement on the adversary that it be nonce-respecting with the ...<|control11|><|separator|>
-
[26]
[PDF] The SIV Mode of Operation for Deterministic Authenticated ...The SIV mode of operation specifies a way for using a blockcipher to encrypt. Encryption under SIV (which stands for “Synthetic IV”) takes as input a key, ...
-
[27]
[PDF] AES-GCM-SIV: Specification and Analysis - Cryptology ePrint Archivegenerates an authentication tag by AES-encrypting the hash value, XOR-ed with ... The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key.<|control11|><|separator|>
-
[28]
None### Summary of COPA from https://eprint.iacr.org/2013/790.pdf
-
[29]
[PDF] Combining message encryption and authenticationBellare and Nanprempre in [7] and Krawczyk in [9] showed, that EtM approach, with secure encryption scheme, secure authentication scheme and two indepen- dent ...<|control11|><|separator|>
-
[30]
[PDF] AN INTRODUCTION TO AUTHENTICATED ENCRYPTIONMar 7, 2013 · Recommendation for block cipher modes of operation: the ccm mode for authentication and confidentiality. NIST Special Publication 800-38C, 2004.<|control11|><|separator|>
-
[31]
[PDF] Combining Authentication with Encryption to get IND-CCAMac-then-Encrypt: IND-CPA? ▫ Theorem: If SE is IND-CPA and MA is SUF-CMA then MtE(SE,MA) is IND-CPA: InsecMtE ind-cpa(k,t,q,l) ≤ InsecSE ind-cpa(k,t,q,l+qs).
-
[32]
The Security and Performance of the Galois/Counter Mode of ...The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing.
-
[33]
None### Summary of Authenticated Encryption with Associated Data (AEAD) from NIST SP 800-38D
-
[34]
[PDF] Performance Galois-Counter- Mode on Intel® Architecture ProcessorsThe main usage of GCM is in the. IPSec, TLS 1.2 and SSH protocols – mostly for secure network communications. With the recent introduction of AES-NI ...
-
[35]
[PDF] Intel® Advanced Encryption Standard (AES) New Instructions SetThis paper provides an overview of the AES algorithm and guidelines for utilizing the. Intel AES New Instructions to achieve high performance and secure AES ...
-
[36]
RFC 7539: ChaCha20 and Poly1305 for IETF Protocols### Summary of ChaCha20-Poly1305 AEAD Construction (RFC 7539, Sections 2 and 3)
-
[37]
[PDF] ChaCha, a variant of Salsa20Jan 28, 2008 · This paper presents the ChaCha family and explains the differences between Salsa20 and. ChaCha. 1 Introduction. 1.1 Background. The Salsa20/20 ...
- [38]
-
[39]
[PDF] The Poly1305-AES message-authentication codeMar 29, 2005 · Abstract. Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety of applications. Poly1305-AES computes.
- [40]
- [41]
- [42]
- [43]
-
[44]
RFC 5297 - Synthetic Initialization Vector (SIV) Authenticated ...This memo describes SIV (Synthetic Initialization Vector), a block cipher mode of operation. SIV takes a key, a plaintext, and multiple variable-length octet ...
-
[45]
[PDF] AEGIS: A Fast Authenticated Encryption Algorithm (v1.1)Sep 15, 2016 · The CAESAR committee members gave very helpful comments on AEGIS. In ... for AEGIS-128 Authenticated Encryption. International ...
-
[46]
[PDF] OCB Mode - Cryptology ePrint ArchiveApr 1, 2001 · An authenticated-encryption scheme can be constructed by appropriately combining an encryp- tion scheme and a message authentication code (MAC), ...
-
[47]
RFC 7253 - The OCB Authenticated-Encryption AlgorithmThis document specifies OCB, a shared-key blockcipher-based encryption scheme that provides confidentiality and authenticity for plaintexts and authenticity ...
-
[48]
Announcing Lightweight Cryptography Selection | CSRCThe team has decided to standardize the Ascon family for lightweight cryptography applications as it meets the needs of most use cases where lightweight ...
-
[49]
[PDF] Status Report on the Final Round of the NIST Lightweight ...Jun 4, 2023 · On February 7, 2023, NIST announced the decision to standardize the ASCON family for lightweight cryptography applications. This report.
-
[50]
[PDF] Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM ...May 17, 2016 · We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, the most widely deployed.
-
[51]
Attacks on GCM with Repeated Nonces - elttamSep 25, 2020 · This post focuses on AES-GCM and the security impact of using the same IV (nonce) to encrypt data to the users of a web application.<|separator|>
-
[52]
[PDF] The Security of ChaCha20-Poly1305 in the Multi-user SettingChaCha20-Poly1305 and Galois Counter Mode (GCM) are the two most popular AEAD schemes in use on the Internet today. The TLS 1.3 specification [Res18] ...<|control11|><|separator|>
-
[53]
[PDF] The fragility of AES-GCM authentication algorithmMar 15, 2013 · The second type of attack requires the receiver to store (in memory) the incoming buffer in such a way that it is followed by a zero block ( ...
-
[54]
[PDF] Cache-timing attacks on AESApr 14, 2005 · Abstract. This paper demonstrates complete AES key recovery from known-plaintext timings of a network server on another computer. This.
-
[55]
[PDF] Efficient Lattice-based Authenticated Encryption: A Practice-Oriented ...Secondly, the proposed AEs are resistant to quantum attacks. The best known quantum attack to sym- metric encryption schemes is based on the work of Grover [17] ...