Login | Register

Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes


Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes

Rasslan, Mohamed and Youssef, Amr (2010) Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes. IEICE Transactions on Information and Systems, E93-D (5). pp. 1301-1032. ISSN 1745-1361

Text (application/pdf)
IEICE_rasslan.pdf - Published Version

Official URL: http://search.ieice.org/bin/summary.php?id=e93-d_5...


Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Hwang et al. (IEICE Trans. Inf. and Syst., Vol. E89-D, No. 4, April 2006) presented a forgery attack against these two schemes and proposed an improvement that they claim resists such attacks. In this paper, we show that the improved authenticated encryption schemes proposed by Hwang et al. are not secure by presenting another message forgery attack against these improved schemes.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Concordia Institute for Information Systems Engineering
Item Type:Article
Authors:Rasslan, Mohamed and Youssef, Amr
Journal or Publication:IEICE Transactions on Information and Systems
Date:1 May 2010
Keywords:authenticated encryption, authenticity, non-repudiation
ID Code:6758
Deposited On:06 Jul 2010 14:16
Last Modified:18 Jan 2018 17:29
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Back to top Back to top