With the rapid development of authenticated encryption (AE) algorithms in recent years, especially after the CAESAR (Competition for Authenticated Encryption: Security, Applicability and Robustness) competition was launched, a large number of excellent authenticated encryption algorithms have emerged, making the analysis of authenticated encryption algorithms a hot research issue. The CAESAR competition was launched under the sponsorship of IACR in 2014, aiming to collect excellent authentication encryption algorithms from all over the world. SAEAES is a relatively excellent authentication encryption algorithm in the CAESAR competition. In this paper, the sponge structure of SAEAES is improved by introducing the MD (Merkle Damgard) iterative structure. At the same time, in order to improve the ability to resist collision attacks, fixed point attacks and cluster attacks, the MD iterative structure itself is also improved.
NIST launched the CAESAR competition for the world in 2014, followed by the current LWC competition. The design and security analysis on authenticated encryption (AE) algorithm have aroused a great upsurge in the world, aiming to meet the needs of the confidentiality and authenticity of the information. At the same time, all kinds of ingenious design and the corresponding security analysis emerged in endlessly. Although the SCREAM algorithm failed to be selected in the third round of CAESAR competition, based on its unique design, it still has a good reference and research significance to carry out safety analysis. In this thesis, according to the relative independence of each module of the SCREAM algorithm structure, the Chosen-message forgery attack of SCREAM was proposed under the condition of one or more pairs of ciphertext, so as to forge the ciphertext and generate the correct authentication tag to pass the verification. Meanwhile, the effectiveness of this method was proved, and the corresponding probability of success was provided. Compared with the existing analysis results, this method has better operability and universality.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.