Login | Register

Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes


Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes

Rasslan, Mohamed and Youssef, Amr (2010) Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes. IEICE Transactions on Information and Systems, E93-D (5). pp. 1301-1032. ISSN 1745-1361

PDF - Published Version

Official URL: http://search.ieice.org/bin/summary.php?id=e93-d_5...


Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Hwang et al. (IEICE Trans. Inf. and Syst., Vol. E89-D, No. 4, April 2006) presented a forgery attack against these two schemes and proposed an improvement that they claim resists such attacks. In this paper, we show that the improved authenticated encryption schemes proposed by Hwang et al. are not secure by presenting another message forgery attack against these improved schemes.

Divisions:Concordia University > Faculty of Engineering and Computer Science > Concordia Institute for Information Systems Engineering
Item Type:Article
Authors:Rasslan, Mohamed and Youssef, Amr
Journal or Publication:IEICE Transactions on Information and Systems
Date:1 May 2010
Keywords:authenticated encryption, authenticity, non-repudiation
ID Code:6758
Deposited On:06 Jul 2010 14:16
Last Modified:08 Dec 2010 15:52
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page


Downloads per month over past year

Back to top Back to top