2015
DOI: 10.1007/978-3-662-47989-6_24
|View full text |Cite
|
Sign up to set email alerts
|

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance

Abstract: Abstract.A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann, Forler, and Lucks (2012). It has become a popular definitional target because, despite allowing encryption to be online, security is supposed to be maintained even if nonces get reused. We argue that this expectation is effectively wrong. OAE1 security has also been claimed to capture best-possible security for any online-AE scheme. We claim that this understanding is wrong, too. So motivated, we redefine OA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
27
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(27 citation statements)
references
References 33 publications
0
27
0
Order By: Relevance
“…Our approach to analyzing nonce misuse differs from the line of research on online nonce misuse resistance [4,27,36], which seeks to analyze schemes which are not able to provide the best possible robustness to nonce misuse [66], but are able to guarantee more than nonce misuse resilience. Böck, Zauner, Devlin, Somorovsky, and Jovanovic [18] investigate the practical applicability of noncemisusing attacks in TLS by searching for servers which repeat nonces with GCM.…”
Section: Related Workmentioning
confidence: 99%
“…Our approach to analyzing nonce misuse differs from the line of research on online nonce misuse resistance [4,27,36], which seeks to analyze schemes which are not able to provide the best possible robustness to nonce misuse [66], but are able to guarantee more than nonce misuse resilience. Böck, Zauner, Devlin, Somorovsky, and Jovanovic [18] investigate the practical applicability of noncemisusing attacks in TLS by searching for servers which repeat nonces with GCM.…”
Section: Related Workmentioning
confidence: 99%
“…In [18], Hoang et al introduced a new notion called OAE2, which supports both online encryption and online decryption. It processes plaintext and ciphertext by partitioning them into a sequence of segments.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, TABLE 1 Comparison study of existing schemes and proposed scheme 14,15,[36][37][38][39][40]45 Scheme Name Parallel Serial OH VME PF Priv. As far our understanding, we use blockcipher-based compression function as a primitive in the component function of the proposed scheme's encryption for the first time.…”
Section: Contributionmentioning
confidence: 99%
“…[42][43][44] 37 Moreover, the OAE(1,2) and PoE use blockcipher also. 36,45 In addition, a full pseudorandom function based scheme that uses tweakable blockcipher in the component function, and the APE uses ideal permutations. 15,39,40 Furthermore, the schemes of COBRA, COPA, and OTR use feistel blockcipher network.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation