HS1-RIV: Improved Efficiency for Authenticated Encryption

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Encryption was “need of the hour” when it was invented but with the progress of time researchers have shown that it is not very effective when implemented alone. Many attacks are present in the present time, which can break any simple encryption in no time. Therefore, researchers have proposed and proved various techniques, which can work along encryption and can increase security by many folds. This paper aims at bringing essence of this evolution and benefits that tag along with it in one document. Various researchers have different point of view regarding the use of techniques and their benefits along with it, some of those point of views and their reasons are given in this paper



  • Keywords

    Authenticated Encryption, Subtle Authenticated Encryption, Robust Authenticated Encryption, Initialization vector, Hash Stream 1 (HS1), SIV, RIV.

  • References

      [1] Abed, F., Forler, C., List, E., Lucks, S., & Wenzel, J. (2016). RIV for Robust Authenticated Encryption. Fast Software Encryption Lecture Notes in Computer Science,23-42. doi:10.1007/978-3-662-52993-5_2

      [2] Geltink, G., & Volokitin, S. (2016). FPGA Implementation of HS1-SIV. Proceedings of the 13th International Joint Conference on e-Business and Telecommunications. doi:10.5220/0005950100410048

      [3] Nir, Y., & Langley, A. (2015). ChaCha20 and Poly1305 for IETF Protocols. Network working group, Internet-Draft. doi:10.17487/rfc7539

      [4] Tjuawinata, I., Huang, T., & Wu, H. (2016). Cryptanalysis of the Authenticated Encryption Algorithm COFFE. Lecture Notes in Computer Science Selected Areas in Cryptography – SAC 2015,510-526. doi:10.1007/978-3-319-31301-6_29

      [5] Harkins, D. (2008). Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). Network Working Group. doi:10.17487/rfc5297

      [6] I. (2016, August 19). Cryptography chosen ciphertext attacks (authenticated encryption). Retrieved December 21, 2017, from https://www.youtube.com/watch?v=l3U-povLQp0

      [7] A. Bhardwaj and S. Som, "Study of different cryptographic technique and challenges in future," 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 2016, pp. 208-212.

      [8] Spammimiccom, “Spam mimic Explanation”, http://www.spammimic.com/explain.shtml, July 21, 2017.

      [9] Som S., Banerjee M., (2013) “Cryptographic Technique by Square Matrix and Single Point Crossover on Binary Field”, 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA'13), IEEE Explorer, Print ISBN: 978-1-4673-2820-3, February 12 – 14, 2013

      [10] Sabu M Thampi , ” Information Hiding Techniques: A Tutorial Review”, ISTE-STTP on Network Security & Cryptography, LBSCE , 2004

      [11] Zhibin Pan, Sen Hu , Xiaoxiao Ma , Lingfei Wang.,( May 2015 )” Reversible data hiding based on local histogram shifting with multilayer embedding”, Journal of Visual Communication and Image Representation Volume 31, August 2015, Pages 64–74

      [12] Tzu-Chuen Lu , Jhih-HueiWu,Chun-ChihHuang,” Dual-image-based reversible data hiding method using center folding strategy”, Signal Processing Volume 115, October 2015, Pages 195–213

      [13] Dr. Preeti Mehta,Ms. Monika Bansal , Ms. Akanksha Upadhyaya,” Stream Cipher and Block Cipher Based Performance Analysis of Symmetric Cryptography Algorithms: AES and DES”, International journal of modern trends in engineering and research ,Volume 2,issue 7 , 2015

      [14] Ritesh Mukherjee, Nabin Ghoshal,” A Novel Technique for Digital Signature using Steganography Based Visual Cryptography (DSSBVC)”ICRITO,Amity university, 2015

      [15] A. Joseph Raphael, Dr. V. Sundaram, ”Cryptography and steganography-A survey” Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630, 2015

      [16] Diffie, W., Hellman, M.E. : New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654, 1976

      [17] Seema Nath, Subhranil Som , “Security and Privacy Challenges: Internet of Things”, Indian Journal of Science and Technology, Scopus Indexed, Vol 10(3), DOI: 10.17485/ijst/2017/v10i3/110642, ISSN (Print): 0974-6846 ISSN (Online): 0974-5645, January 2017.

      [18] Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299

      [19] Rivest, R.L., Shamir, A., Adleman, L.M. (1983): A method for obtaining digital signatures and public-key cryptosystems (reprint). Commun. ACM 26(1), 96–99, 1984

      [20] El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18, 1985

      [21] U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: Issues and challenges,” Proc. IEEE (Special Issue Multimedia Security for Digital Rights Management), vol. 92, no. 6, pp. 948–960, June 2004.

      [22] Cryptographic competitions. (n.d.). Retrieved December 26, 2017, from https://competitions.cr.yp.to/round2/hs1sivv2.pdf




Article ID: 10871
DOI: 10.14419/ijet.v7i2.7.10871

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.