Authenticated Encryption Schemes

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Authenticated encryption offers the combined security properties of an encryption scheme and a message authentication code: it protects both confidentiality and authenticity of data. Authenticated encryption schemes are also referred to as authenticated ciphers or authenticated encryption with associated data. Like pure encryption schemes, authenticated encryption schemes and their security notions were originally formalized in terms of probabilistic algorithms. The two security goals of authenticated encryption, confidentiality and authenticity, are also reflected in its design: an authenticated cipher needs to iterate a core processing step that, on the one hand, translates the plaintext to a ciphertext block by block and, on the other hand, updates an internal state to produce a final authentication tag for the entire message. More recent designs, such as the ciphers in the CAESAR portfolio, show that dedicated constructions can be very competitive both in terms of efficiency and in terms of simplicity.
Original languageEnglish
Title of host publicationSymmetric Cryptography, Volume 1: Design and Security Proofs
EditorsChristina Boura, Maria Naya-Plasencia
PublisherISTE; Wiley
Chapter6
Pages87-97
Number of pages11
ISBN (Electronic)978-1-394-25633-4
ISBN (Print)978-1-789-45146-7
DOIs
Publication statusPublished - 1 Jan 2024

Keywords

  • Authenticated encryption schemes
  • Authenticity
  • Confidentiality
  • Message authentication code
  • Security notions

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Authenticated Encryption Schemes'. Together they form a unique fingerprint.

Cite this