Abstract :
Wondering whether researchers have a cryptographic tool able to provide both confidentiality (privacy) and integrity (authenticity) of a message? They do: authenticated encryption (AE), a symmetric-key mechanism that transforms a message into a ciphertext. This article discusses standard AE algorithms, classic security models´ shortcomings for AE algorithms, and related attacks. Motivated by these attacks, the crypto community started CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) to promote the development of next-generation AE algorithms.
Keywords :
authorisation; cryptography; data integrity; data privacy; CAESAR; authenticated encryption; ciphertext; competition for authenticated encryption: security applicability and robustness; crypto community; cryptographic tool; message confidentiality; message integrity; next-generation AE algorithms; next-generation algorithms; security models; symmetric-key mechanism; Algorithm design and analysis; Authentication; Computer security; Cryptography; Encryption; CAESAR; authenticated encryption; computer security; fragmentation attacks; information-leaking attacks; modes of operation; side channel attacks;