2014
DOI: 10.1007/978-3-662-45611-8_7
|View full text |Cite
|
Sign up to set email alerts
|

Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET

Abstract: In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom permutation (PRP) blockcipher, and POET [3], based on Almost XOR-Universal (AXU) hash and strong pseudorandom permutation (SPRP), were proposed. Few weeks later, COBRA mode and a simple variant of the original proposal of POET (due to a forging attack [13] on the original proposal) with AES as an underlying blockcipher, were submitted to CAESAR, a competition [1] of authenticated encryption (AE). In this paper, we show a forging att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…A prime example of where the security argument of an intricate AEAD scheme turned out to be fatally flawed, and this went unnoticed for a rather long period of time, is given by the recent results on OCB2 that completely broke the scheme [IIMP19]. There are several similar cases to report on, including the flawed EAX' scheme [MLMI14], a flawed argument in the security proof of GCM [IOM12], and flaws in some of the CAESAR submissions [Nan14,BS16,SMAP16].…”
Section: Motivation For Aead Combinersmentioning
confidence: 99%
“…A prime example of where the security argument of an intricate AEAD scheme turned out to be fatally flawed, and this went unnoticed for a rather long period of time, is given by the recent results on OCB2 that completely broke the scheme [IIMP19]. There are several similar cases to report on, including the flawed EAX' scheme [MLMI14], a flawed argument in the security proof of GCM [IOM12], and flaws in some of the CAESAR submissions [Nan14,BS16,SMAP16].…”
Section: Motivation For Aead Combinersmentioning
confidence: 99%
“…For example, R. Ankele in his Ph.D. thesis [2] analyses the COPA authenticated encryption composition scheme used in several CAESAR candidates. M. Nandi in his 2014 paper [13] demonstrates a forging attack on COBRA and POET ciphers.…”
Section: Related Researchmentioning
confidence: 99%
“…Since then, many authentication encryption schemes have been proposed, such as ALE, FIDES, and AEZ [36][37][38][39][40][41][42]. However, no one has yet completely mastered all the security issues in this emerging field, and a number of security problems [43][44][45][46] have emerged. Research on authentication encryption is likely to become one of the most popular research directions in the coming years.…”
Section: Cryptographic Algorithmsmentioning
confidence: 99%