International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 17 December 2014

Christian Forler, David McGrew, Stefan Lucks, Jakob Wenzel
ePrint Report ePrint Report
In this paper we introduce the first authenticated encryption scheme

based on a hash function, called COFFE. This research has been

motivated by the challenge to fit secure cryptography into constrained

devices -- some of these devices have to use a hash function, anyway,

and the challenge is to avoid the usage of an additional block cipher

to provide authenticated encryption. COFFE satisfies the common

security requirements regarding authenticated encryption, i.e., IND-CPA-

and INT-CTXT-security. Beyond that, it provides the following

additional security features: resistance against side-channel attacks

and INT-CTXT security in the nonce-misuse scenario. It also support

failure-friendly authentication under reasonable assumptions.

Expand

Additional news items may be found on the IACR news page.