- Published Version
Official URL: http://search.ieice.org/bin/summary.php?id=e93-d_5...
Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Hwang et al. (IEICE Trans. Inf. and Syst., Vol. E89-D, No. 4, April 2006) presented a forgery attack against these two schemes and proposed an improvement that they claim resists such attacks. In this paper, we show that the improved authenticated encryption schemes proposed by Hwang et al. are not secure by presenting another message forgery attack against these improved schemes.
|Divisions:||Concordia University > Faculty of Engineering and Computer Science > Concordia Institute for Information Systems Engineering|
|Authors:||Rasslan, Mohamed and Youssef, Amr|
|Journal or Publication:||IEICE Transactions on Information and Systems|
|Date:||1 May 2010|
|Keywords:||authenticated encryption, authenticity, non-repudiation|
|Deposited By:||ANDREA MURRAY|
|Deposited On:||06 Jul 2010 14:16|
|Last Modified:||08 Dec 2010 15:52|
Repository Staff Only: item control page
Downloads per month over past year