Cryptology ePrint Archive: Report 2014/958
Authenticated Encryption: How Reordering can Impact Performance
Basel Alomair
Abstract: In this work, we look at authenticated encryption schemes from a new perspective. As opposed to focusing solely on the {\em ``security''} implications of the different methods for constructing authenticated encryption schemes, we investigate the effect of the method used to construct an authenticated encryption scheme on the {\em ``performance''} of the construction. We show that, as opposed to the current NIST standard, by performing the authentication operation before the encryption operation, the computational efficiency of the construction can be increased, without affecting the security of the overall construction. In fact, we show that the proposed construction is even more secure than standard authentication based on universal hashing in the sense that the hashing key is resilient to key recovery attacks.
Category / Keywords: secret-key cryptography /
Original Publication (with major differences): International Conference on Applied Cryptography and Network Security
Date: received 23 Nov 2014
Contact author: alomair at uw edu
Available format(s): PDF | BibTeX Citation
Version: 20141125:204014 (All versions of this report)
Short URL: ia.cr/2014/958
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]