Symmetric key-based authenticated encryption protocol

Milap J. Bhuva, Sanjay Singh

Research output: Contribution to journalArticle

Abstract

Authenticated Encryption (AE)–is a block cipher mode of operation protocol which gives privacy, integrity, and authenticity confirmations on the data at the same time; incorporating decryption in a single step with an integrity check. The requirement for AE has risen out of the perception that safely integrating a confidentiality feature with an authentication feature could be error-prone and troublesome. It is confirmed by various practical assaults brought into the creation of authentication protocols and applications by wrong execution or lack of authentication. It is a challenge to design and develop such a kind of AE protocols which compromises authenticity and confidentiality with all possibly provable security notions. In this paper, we have developed a symmetric-key based fast, efficient, and secure AE protocol. Our protocol meets the objectives of distinguishing authentication, mutual authentication while guaranteeing data integrity, confidentiality, authenticity and secure key sharing between involved parties. We have used ProVerif to verify our proposed protocol formally and found it to be provably safe on all the standard tests.

Original languageEnglish
Pages (from-to)35-45
Number of pages11
JournalInformation Security Journal
Volume28
Issue number1-2
DOIs
Publication statusPublished - 04-03-2019

Fingerprint

Authentication
Cryptography
Encryption
Authenticity
Confidentiality
Integrity

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Science Applications
  • Information Systems and Management

Cite this

@article{6c297c100c0b4474896a2eed27374036,
title = "Symmetric key-based authenticated encryption protocol",
abstract = "Authenticated Encryption (AE)–is a block cipher mode of operation protocol which gives privacy, integrity, and authenticity confirmations on the data at the same time; incorporating decryption in a single step with an integrity check. The requirement for AE has risen out of the perception that safely integrating a confidentiality feature with an authentication feature could be error-prone and troublesome. It is confirmed by various practical assaults brought into the creation of authentication protocols and applications by wrong execution or lack of authentication. It is a challenge to design and develop such a kind of AE protocols which compromises authenticity and confidentiality with all possibly provable security notions. In this paper, we have developed a symmetric-key based fast, efficient, and secure AE protocol. Our protocol meets the objectives of distinguishing authentication, mutual authentication while guaranteeing data integrity, confidentiality, authenticity and secure key sharing between involved parties. We have used ProVerif to verify our proposed protocol formally and found it to be provably safe on all the standard tests.",
author = "Bhuva, {Milap J.} and Sanjay Singh",
year = "2019",
month = "3",
day = "4",
doi = "10.1080/19393555.2019.1629514",
language = "English",
volume = "28",
pages = "35--45",
journal = "Information Security Journal",
issn = "1939-3555",
publisher = "Taylor and Francis Ltd.",
number = "1-2",

}

Symmetric key-based authenticated encryption protocol. / Bhuva, Milap J.; Singh, Sanjay.

In: Information Security Journal, Vol. 28, No. 1-2, 04.03.2019, p. 35-45.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Symmetric key-based authenticated encryption protocol

AU - Bhuva, Milap J.

AU - Singh, Sanjay

PY - 2019/3/4

Y1 - 2019/3/4

N2 - Authenticated Encryption (AE)–is a block cipher mode of operation protocol which gives privacy, integrity, and authenticity confirmations on the data at the same time; incorporating decryption in a single step with an integrity check. The requirement for AE has risen out of the perception that safely integrating a confidentiality feature with an authentication feature could be error-prone and troublesome. It is confirmed by various practical assaults brought into the creation of authentication protocols and applications by wrong execution or lack of authentication. It is a challenge to design and develop such a kind of AE protocols which compromises authenticity and confidentiality with all possibly provable security notions. In this paper, we have developed a symmetric-key based fast, efficient, and secure AE protocol. Our protocol meets the objectives of distinguishing authentication, mutual authentication while guaranteeing data integrity, confidentiality, authenticity and secure key sharing between involved parties. We have used ProVerif to verify our proposed protocol formally and found it to be provably safe on all the standard tests.

AB - Authenticated Encryption (AE)–is a block cipher mode of operation protocol which gives privacy, integrity, and authenticity confirmations on the data at the same time; incorporating decryption in a single step with an integrity check. The requirement for AE has risen out of the perception that safely integrating a confidentiality feature with an authentication feature could be error-prone and troublesome. It is confirmed by various practical assaults brought into the creation of authentication protocols and applications by wrong execution or lack of authentication. It is a challenge to design and develop such a kind of AE protocols which compromises authenticity and confidentiality with all possibly provable security notions. In this paper, we have developed a symmetric-key based fast, efficient, and secure AE protocol. Our protocol meets the objectives of distinguishing authentication, mutual authentication while guaranteeing data integrity, confidentiality, authenticity and secure key sharing between involved parties. We have used ProVerif to verify our proposed protocol formally and found it to be provably safe on all the standard tests.

UR - http://www.scopus.com/inward/record.url?scp=85068175351&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85068175351&partnerID=8YFLogxK

U2 - 10.1080/19393555.2019.1629514

DO - 10.1080/19393555.2019.1629514

M3 - Article

VL - 28

SP - 35

EP - 45

JO - Information Security Journal

JF - Information Security Journal

SN - 1939-3555

IS - 1-2

ER -