Paper 2014/958

Authenticated Encryption: How Reordering can Impact Performance

Basel Alomair

Abstract

In this work, we look at authenticated encryption schemes from a new perspective. As opposed to focusing solely on the {\em ``security''} implications of the different methods for constructing authenticated encryption schemes, we investigate the effect of the method used to construct an authenticated encryption scheme on the {\em ``performance''} of the construction. We show that, as opposed to the current NIST standard, by performing the authentication operation before the encryption operation, the computational efficiency of the construction can be increased, without affecting the security of the overall construction. In fact, we show that the proposed construction is even more secure than standard authentication based on universal hashing in the sense that the hashing key is resilient to key recovery attacks.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Major revision. International Conference on Applied Cryptography and Network Security
Contact author(s)
alomair @ uw edu
History
2014-11-25: received
Short URL
https://ia.cr/2014/958
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/958,
      author = {Basel Alomair},
      title = {Authenticated Encryption: How Reordering can Impact Performance},
      howpublished = {Cryptology ePrint Archive, Paper 2014/958},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/958}},
      url = {https://eprint.iacr.org/2014/958}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.