Login | Register

Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes

Title:

Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes

Rasslan, Mohamed and Youssef, Amr (2010) Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes. IEICE Transactions on Information and Systems, E93-D (5). pp. 1301-1032. ISSN 1745-1361

[thumbnail of IEICE_rasslan.pdf]
Preview
Text (application/pdf)
IEICE_rasslan.pdf - Published Version
67kB

Official URL: http://search.ieice.org/bin/summary.php?id=e93-d_5...

Abstract

Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Hwang et al. (IEICE Trans. Inf. and Syst., Vol. E89-D, No. 4, April 2006) presented a forgery attack against these two schemes and proposed an improvement that they claim resists such attacks. In this paper, we show that the improved authenticated encryption schemes proposed by Hwang et al. are not secure by presenting another message forgery attack against these improved schemes.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Concordia Institute for Information Systems Engineering
Item Type:Article
Refereed:Yes
Authors:Rasslan, Mohamed and Youssef, Amr
Journal or Publication:IEICE Transactions on Information and Systems
Date:1 May 2010
Keywords:authenticated encryption, authenticity, non-repudiation
ID Code:6758
Deposited By: ANDREA MURRAY
Deposited On:06 Jul 2010 14:16
Last Modified:18 Jan 2018 17:29
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top