Proceedings of the 2015 International Conference on Electronic Science and Automation Control

A Forgery Attack on Leaked-State Authenticated Encryption

Authors
Jieshen Mao, Daoguang Mu, Xuejia Lai
Corresponding Author
Jieshen Mao
Available Online August 2015.
DOI
10.2991/esac-15.2015.32How to use a DOI?
Keywords
CASESAR, LAC, Birthday paradox, Leaked-State authenticated encryption, forgery attack
Abstract

The CAESAR competition is launched in 2013 which aims to find some authenticated encryption with good security and performance. Among these submissions, LAC is designed in a unique way with leaked-state structure. In this paper, based on birthday paradox,we find a forgery attack on LAC in nonce-misused case with time complexity 228. Moreover, we generalize the attack on normal version of leaked-state authenticated encryption and conclude some suggestions on how to use such structure.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Conference on Electronic Science and Automation Control
Series
Advances in Computer Science Research
Publication Date
August 2015
ISBN
10.2991/esac-15.2015.32
ISSN
2352-538X
DOI
10.2991/esac-15.2015.32How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Jieshen Mao
AU  - Daoguang Mu
AU  - Xuejia Lai
PY  - 2015/08
DA  - 2015/08
TI  - A Forgery Attack on Leaked-State Authenticated Encryption
BT  - Proceedings of the 2015 International Conference on Electronic Science and Automation Control
PB  - Atlantis Press
SP  - 128
EP  - 131
SN  - 2352-538X
UR  - https://doi.org/10.2991/esac-15.2015.32
DO  - 10.2991/esac-15.2015.32
ID  - Mao2015/08
ER  -