2015
DOI: 10.1007/978-3-662-46706-0_10
|View full text |Cite
|
Sign up to set email alerts
|

COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse

Abstract: Abstract. We present a new, misuse-resistant scheme for online authenticated encryption, following the framework set forth by Fleischmann et al. (FSE 2012). Our scheme, COBRA, is roughly as efficient as the GCM mode of operation for nonce-based authenticated encryption, performing one block cipher call plus one finite field multiplication per message block in a parallelizable way. The major difference from GCM is that COBRA preserves privacy up to prefix under nonce repetition. However, COBRA only provides au… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
7
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 25 publications
1
7
0
Order By: Relevance
“…In fact, the attack works for the mode COBRA based on any blockcipher. Thus it disproves the claim stated in [4]. The authenticity advantage of our proposed algorithm is about 1/2 and it makes about 2n encryption queries where n is the plaintext size of the underlying blockcipher.…”
Section: Our Contributionsupporting
confidence: 78%
See 3 more Smart Citations
“…In fact, the attack works for the mode COBRA based on any blockcipher. Thus it disproves the claim stated in [4]. The authenticity advantage of our proposed algorithm is about 1/2 and it makes about 2n encryption queries where n is the plaintext size of the underlying blockcipher.…”
Section: Our Contributionsupporting
confidence: 78%
“…In this paper, we demonstrate forging attack on COBRA with practical complexity. Hence the theorem proved in [4] is wrong. We also demonstrate forging and distinguishing attack on POET-m for one particular recommended choice of AXU hash function.…”
Section: Resultsmentioning
confidence: 98%
See 2 more Smart Citations
“…However it also renders a compliant scheme vulnerable to CCA, CPSS, and NM attacks even if AD values are unique. Schemes1: COBRA [11] OAE1c Leaks equality of any blocks at the same position. E.g., if ciphertexts and ′ arise from 4-block plaintexts = A ‖ B ‖ C ‖ D and…”
Section: Oae1mentioning
confidence: 99%