McOE
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes. On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably secure against nonce-respecting adversaries. But they fail badly for more general adversaries. This is not a theoretical observation only – in practice, the reuse of nonces is a frequent issue. In recent years, cryptographers developed misuse-resistant schemes for Authenticated Encryption. These guarantee excellent security even against general adversaries which are allowed to reuse nonces. Their disadvantage is that encryption can be performed in an off-line way, only. This paper considers OAE schemes dealing both with nonce-respecting and with general adversaries. It introduces McOE, an efficient design for OAE schemes. For this we present in detail one of the family members, McOEx, which is a design solely based on a standard block cipher. As all the other member of the McOE family, it provably guarantees reasonable security against general adversaries as well as standard security against nonce-respecting adversaries.
Keywords for this software
References in zbMATH (referenced in 16 articles , 1 standard article )
Showing results 1 to 16 of 16.
Sorted by year (- Andreeva, Elena; Bhati, Amit Singh; Vizár, Damian: Nonce-misuse security of the SAEF authenticated encryption mode (2021)
- Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick: The \textttDeoxysAEAD family (2021)
- Liu, Gang; Wang, Peng; Wei, Rong; Ye, Dingfeng: Revisiting construction of online cipher in hash-ECB-hash structure (2021)
- Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul: Blockcipher-based authenticated encryption: how small can we go? (2020)
- Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan: Beyond conventional security in sponge-based authenticated encryption modes (2019)
- Forler, Christian; List, Eik; Lucks, Stefan; Wenzel, Jakob: \textscPOEx: a beyond-birthday-bound-secure on-line cipher (2018)
- Jha, Ashwin; Nandi, Mridul: On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers (2018)
- List, Eik; Nandi, Mridul: Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption (2017)
- Mazumder, Rashed; Miyaji, Atsuko; Su, Chunhua: Probably secure keyed-function based authenticated encryption schemes for big data (2017)
- Bossuet, Lilian; Datta, Nilanjan; Mancillas-López, Cuauhtemoc; Nandi, Mridul: ELmD: a pipelineable authenticated encryption and its hardware implementation (2016)
- Chakraborty, Debrup; Sarkar, Palash: On modes of operations of a block cipher for authentication and authenticated encryption (2016)
- Nikolić, Ivica; Sasaki, Yu: A new algorithm for the unbalanced meet-in-the-middle problem (2016)
- Peyrin, Thomas; Seurin, Yannick: Counter-in-Tweak: authenticated encryption modes for tweakable block ciphers (2016)
- Reyhanitabar, Reza; Vaudenay, Serge; Vizár, Damian: Authenticated encryption with variable stretch (2016)
- Hoang, Viet Tung; Reyhanitabar, Reza; Rogaway, Phillip; Vizár, Damian: Online authenticated-encryption and its nonce-reuse misuse-resistance (2015)
- Fleischmann, Ewan; Forler, Christian; Lucks, Stefan: McOE: a family of almost foolproof on-line authenticated encryption schemes (2012)