We also present a simple proof of security within the concept of Deterministic Authenticated Encryption (DAE) introduced by Rogaway and Shrimpton. We extend the setting by allowing the adversary to query the permutation and following the indifferentiability setting in the security proof of the sponge construction.
Category / Keywords: secret-key cryptography / Key wrapping, DAE, sponge, Keccak Date: received 11 Mar 2013 Contact author: khovratovich at gmail com, dmitry khovratovich@uni lu Available format(s): PDF | BibTeX Citation Version: 20130313:050947 (All versions of this report) Short URL: ia.cr/2013/145 Discussion forum: Show discussion | Start new discussion