Sharif University of Technology Department of Computer Engineering Data and Network Security Lab Authenticated Encryption (AE) Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaway s Introduction to Modern Cryptography course. 1 / 41
Outline Motivation Generic Composition Authenticated Encryption with Associated Data (AEAD) 2 / 41
Motivation 3 / 41
Authenticated Encryption 4 / 41
Authenticated Encryption Schemes 5 / 41
Privacy of Authenticated Encryption Schemes 6 / 41
Integrity of Authenticated Encryption Schemes 7 / 41
INT-CTXT 8 / 41
Integrity with privacy 9 / 41
Relations 10 / 41
Plain Encryption Does Not Provide Integrity 11 / 41
Encryption with Redundancy 12 / 41
Encryption with Redundancy Fails 13 / 41
WEP Attack 14 / 41
Generic Composition 15 / 41
Generic Composition 16 / 41
Generic Composition Methods 17 / 41
Encrypt-and-MAC 18 / 41
Encrypt-and-MAC 19 / 41
Encrypt-and-MAC 20 / 41
Encrypt-and-MAC 21 / 41
MAC-then-Encrypt 22 / 41
MAC-then-Encrypt 23 / 41
MAC-then-Encrypt 24 / 41
MAC-then-Encrypt 25 / 41
Encrypt-then-MAC 26 / 41
Encrypt-then-MAC 27 / 41
Encrypt-then-MAC 28 / 41
Encrypt-then-MAC 29 / 41
Achieving IND-CCA 30 / 41
Two keys or one? 31 / 41
Generic Composition in Practice 32 / 41
AE in SSH 33 / 41
AE in SSL 34 / 41
Authenticated Encryption with Associated Data (AEAD) 35 / 41
AEAD 36 / 41
AEAD Privacy 37 / 41
AEAD Integrity 38 / 41
AEAD Schemes 39 / 41
Performance Comparisons x32 40 / 41
Questions? 41 / 41