ELmD: a pipelineable authenticated encryption and its hardware implementation. Authenticated encryption schemes which resist misuse of nonce at some desired level of privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full privacy) and online constructions like McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only the last one is almost parallelizable except that for associated data processing, the final block-cipher call is sequential (it needs to wait for the encryption of all the previous ones). In this paper, we design a new online secure authenticated encryption, called ELmD or Encrypt-Linear mix-Decrypt, which is completely (two-stage) parallel (even in associated data) and fully pipeline implementable. It also provides full privacy when associated data is not repeated. Like COPA, our construction is based on EME, an Encrypt-Mix-Encrypt type SPRP construction (secure against chosen plaintext and ciphertext). But unlike EME, we have used an online computable efficient linear mixing instead of a non-linear mixing. We have also provided the hardware implementation of the construction and compare the performance with similar constructions like COPA and EME2

References in zbMATH (referenced in 14 articles , 1 standard article )

Showing results 1 to 14 of 14.
Sorted by year (citations)

  1. Liu, Gang; Wang, Peng; Wei, Rong; Ye, Dingfeng: Revisiting construction of online cipher in hash-ECB-hash structure (2021)
  2. Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi: Improved key recovery attacks on reduced-round AES with practical data and memory complexities (2020)
  3. Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul: Blockcipher-based authenticated encryption: how small can we go? (2020)
  4. Fan, Aiwan; Wang, Qiming; Debnath, Joyati: A high precision data encryption algorithm in wireless network mobile communication (2019)
  5. Forler, Christian; List, Eik; Lucks, Stefan; Wenzel, Jakob: \textscPOEx: a beyond-birthday-bound-secure on-line cipher (2018)
  6. Jha, Ashwin; Nandi, Mridul: On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers (2018)
  7. Grassi, Lorenzo; Rechberger, Christian; Rønjom, Sondre: A new structural-differential property of 5-round AES (2017)
  8. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
  9. Bay, Aslı; Ersoy, Oğuzhan; Karakoç, Ferhat: Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm (2016)
  10. Bossuet, Lilian; Datta, Nilanjan; Mancillas-López, Cuauhtemoc; Nandi, Mridul: ELmD: a pipelineable authenticated encryption and its hardware implementation (2016)
  11. Dobraunig, Christoph; Eichlseder, Maria; Korak, Thomas; Lomné, Victor; Mendel, Florian: Statistical fault attacks on nonce-based authenticated encryption schemes (2016)
  12. Mennink, Bart: XPX: generalized tweakable Even-Mansour with improved security guarantees (2016)
  13. Sun, Bing; Liu, Meicheng; Guo, Jian; Qu, Longjiang; Rijmen, Vincent: New insights on AES-like SPN ciphers (2016)
  14. Tjuawinata, Ivan; Huang, Tao; Wu, Hongjun: Cryptanalysis of the authenticated encryption algorithm COFFE (2016)