IACR News item: 29 March 2014
Mohamed Ahmed Abdelraheem, Andrey Bogdanov, Elmar Tischhauser
ePrint Report
We evaluate the security of the recently proposed authenticated encryption scheme POET with regard to weak keys when its universal hash functions are instantiated with finite field multiplications. We give explicit constructions for weak key classes not covered by POET\'s
weak key testing strategy, and demonstrate how to leverage them to obtain universal forgeries.
Additional news items may be found on the IACR news page.