International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm

Authors:
Mihir Bellare
Chanathip Namprempre
Download:
URL: http://eprint.iacr.org/2000/025
Search ePrint
Search Google
Abstract: An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such schemes, namely integrity of plaintexts and integrity of ciphertexts, and relate them (when coupled with IND-CPA) to the standard notions of privacy (IND-CCA, NM-CPA) by presenting implications and separations between all notions considered. We then analyze the security of authenticated encryption schemes designed by ``generic composition,'' meaning making black-box use of a given symmetric encryption scheme and a given MAC. Three composition methods are considered, namely Encrypt-and-MAC, MAC-then-encrypt, and Encrypt-then-MAC. For each of these, and for each notion of security, we indicate whether or not the resulting scheme meets the notion in question assuming the given symmetric encryption scheme is secure against chosen-plaintext attack and the given MAC is unforgeable under chosen-message attack. We provide proofs for the cases where the answer is ``yes'' and counter-examples for the cases where the answer is ``no.''
BibTeX
@misc{eprint-2000-11369,
  title={Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm},
  booktitle={IACR Eprint archive},
  keywords={Symmetric encryption, message authentication, authenticated encryption, concrete security},
  url={http://eprint.iacr.org/2000/025},
  note={ nchanath@engr.tu.ac.th 13709 received 28 May 2000, last revised 14 Jul 2007},
  author={Mihir Bellare and Chanathip Namprempre},
  year=2000
}