Cryptology ePrint Archive: Report 2012/580
Cryptanalysis of the OKH Authenticated Encryption Scheme
Peng Wang and Wenling Wu and Liting Zhang
Abstract: Alomair proposed a new authenticated encryption scheme OKH at ACNS 2012, and proved the security, i.e. authenticity and privacy, of OKH. Our research shows that it is not the case. We only need one query to break the authenticity of OKH with success probability of $1$, and two queries to break the privacy of OKH with success probability of $1-1/2^n$, where $n$ is the block-length of underlying blockcipher.
Category / Keywords: secret-key cryptography / Authenticated Encryption
Date: received 10 Oct 2012, last revised 28 Nov 2012
Contact author: wp at is ac cn
Available format(s): PDF | BibTeX Citation
Version: 20121129:053013 (All versions of this report)
Short URL: ia.cr/2012/580
[ Cryptology ePrint archive ]