Cryptology ePrint Archive: Report 2012/580

Cryptanalysis of the OKH Authenticated Encryption Scheme

Peng Wang and Wenling Wu and Liting Zhang

Abstract: Alomair proposed a new authenticated encryption scheme OKH at ACNS 2012, and proved the security, i.e. authenticity and privacy, of OKH. Our research shows that it is not the case. We only need one query to break the authenticity of OKH with success probability of $1$, and two queries to break the privacy of OKH with success probability of $1-1/2^n$, where $n$ is the block-length of underlying blockcipher.

Category / Keywords: secret-key cryptography / Authenticated Encryption

Date: received 10 Oct 2012, last revised 28 Nov 2012

Contact author: wp at is ac cn

Available format(s): PDF | BibTeX Citation

Version: 20121129:053013 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]