期刊文献+

基于Oracle模型的可认证加密协议安全性分析 被引量:1

Security analysis of authenticated encryption based on Oracle model
下载PDF
导出
摘要 密码算法的安全定义研究以及定义间的深入理解已经成为现代密码学的主要研究领域。然而,当前多数可认证加密方案缺乏必要的安全性分析,为了分析协议安全性,在IND-CPA概念基础上,对加密与MAC组合与先MAC后加密两种对称式的可认证加密协议予以分析,并分别用Oracle机方法给出了IND-CPA攻击下的安全性证明。结果表明加密与MAC组合方式不能保证IND-CPA安全,但先MAC后加密方式则可实现IND-CPA安全。 The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptography. However, most of currently authenticated encryption schemes is lack of the essential security analysis. To analyze the security of scheme encrypt after MAC on the basis of the standard notions for the and the security for two authenticated encryption model: Encrypt and MAC, indistinguishability against chosen-plaintext attacks (1ND-CPA). For each of these, the security proofs are proposed using Oracle model in the IND-CPA sence. The results indicate that the encrypt and MAC method is insecure against IND-CPA attack, but the encrypt after MAC is secure.
机构地区 中原工学院
出处 《计算机工程与设计》 CSCD 北大核心 2007年第10期2303-2305,共3页 Computer Engineering and Design
基金 河南省自然科学基金项目(0411013600)
关键词 认证加密 选择明文攻击 不可区分性 消息认证 对称密码 authenticated encryption CPA indistinguishability message authentication symmetric encryption
  • 相关文献

参考文献8

  • 1Hugo Krawczyk.The order of encryption and authentication for protecting communications[C].Lecture Notes in Computer Science,2001.310-331.
  • 2Tseng Y M,Jan JK J K,Chien H Y.Digital signature with message recovery using self-c ertified public keys and its Wariants[J].Applied Mathematics and Computation,2002,136(2-3):203-214.6
  • 3Huang Hui-Feng,Chang Chin-Chen.An efficient convertible authenticated encryption scheme and its variant[C].Lecture Notes in Computer Science,2003.382-392.
  • 4Ma C S,Chen K EPublicly verifiable authenticated encryption[J].Electronics Letters,2003,39(3):281-282.
  • 5Lee N Y.The security of the improvement on the generalization of threshold signature and authenticated encryption[J].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences,2002,E85A(10):2364-2367.
  • 6Katzl J,Yung M.Characterization of security notions for probabilistic private-key encryption[J].Journal of Cryptology,2006,19(1):67-95.
  • 7Zhao Z M,Liu F Y.Method of constructing elliptic curve authenticated encryption scheme[J].Applied Mathematics and Computation,2005,168(1):146-151.
  • 8Peng Yin-Qiao,Xie Shi-Yi,Chen Yue-Feng.A publicly verifiable authenticated encryption scheme with message linkages[C].Heidelberg:Springer Berlin,Lecture Notes in Computer Science,2005.1271-1276.

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部