Presentation | 2013-07-19 Attacks on Authenticated Encryption Based on ε-MACs Hayato KOBAYASHI, Hiraku MORITA, Tetsu IWATA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | An Authenticated Encryption (AE) scheme guarantees both privacy and authenticity of data. Alomair proposed a new message authentication code called ε-MAC at ICISC 2010. ε-MAC is designed to be used as a component in the construction of generic AE schemes. It was claimed that its optimized computation improves the efficiency of the entire AE scheme. Moreover, Alomair claimed that an AE scheme based on ε-MAC is provably secure if the encryption algorithm used in the AE scheme satisfies a certain security requirement. However, in this paper, we present forgery attack and distinguishing attack from random bits by exploiting the fact that the prime number used in ε-MAC is smaller than the maximum value represented by one block. Furthermore, Alomair claimed that it is possible to construct an AE scheme providing INT-CTXT, but we point out that the scheme based on ε-MAC cannot be secure in terms of confidentiality. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | ε-MAC / Authenticated Encryption scheme / MAC / forgery attack / distinguishing attack |
Paper # | ISEC2013-50,SITE2013-45,ICSS2013-55,EMM2013-52 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2013/7/11(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Attacks on Authenticated Encryption Based on ε-MACs |
Sub Title (in English) | |
Keyword(1) | ε-MAC |
Keyword(2) | Authenticated Encryption scheme |
Keyword(3) | MAC |
Keyword(4) | forgery attack |
Keyword(5) | distinguishing attack |
1st Author's Name | Hayato KOBAYASHI |
1st Author's Affiliation | Dept. of Computational Science and Engineering, Nagoya University() |
2nd Author's Name | Hiraku MORITA |
2nd Author's Affiliation | Dept. of Computational Science and Engineering, Nagoya University |
3rd Author's Name | Tetsu IWATA |
3rd Author's Affiliation | Dept. of Computational Science and Engineering, Nagoya University |
Date | 2013-07-19 |
Paper # | ISEC2013-50,SITE2013-45,ICSS2013-55,EMM2013-52 |
Volume (vol) | vol.113 |
Number (no) | 135 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |