McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes. On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably secure against nonce-respecting adversaries. But they fail badly for more general adversaries. This is not a theoretical observation only – in practice, the reuse of nonces is a frequent issue. In recent years, cryptographers developed misuse-resistant schemes for Authenticated Encryption. These guarantee excellent security even against general adversaries which are allowed to reuse nonces. Their disadvantage is that encryption can be performed in an off-line way, only. This paper considers OAE schemes dealing both with nonce-respecting and with general adversaries. It introduces McOE, an efficient design for OAE schemes. For this we present in detail one of the family members, McOEx, which is a design solely based on a standard block cipher. As all the other member of the McOE family, it provably guarantees reasonable security against general adversaries as well as standard security against nonce-respecting adversaries.

References in zbMATH (referenced in 13 articles , 1 standard article )

Showing results 1 to 13 of 13.
Sorted by year (citations)

  1. Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul: Blockcipher-based authenticated encryption: how small can we go? (2020)
  2. Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan: Beyond conventional security in sponge-based authenticated encryption modes (2019)
  3. Forler, Christian; List, Eik; Lucks, Stefan; Wenzel, Jakob: \textscPOEx: a beyond-birthday-bound-secure on-line cipher (2018)
  4. Jha, Ashwin; Nandi, Mridul: On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers (2018)
  5. List, Eik; Nandi, Mridul: Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption (2017)
  6. Mazumder, Rashed; Miyaji, Atsuko; Su, Chunhua: Probably secure keyed-function based authenticated encryption schemes for big data (2017)
  7. Bossuet, Lilian; Datta, Nilanjan; Mancillas-López, Cuauhtemoc; Nandi, Mridul: ELmD: a pipelineable authenticated encryption and its hardware implementation (2016)
  8. Chakraborty, Debrup; Sarkar, Palash: On modes of operations of a block cipher for authentication and authenticated encryption (2016)
  9. Nikolić, Ivica; Sasaki, Yu: A new algorithm for the unbalanced meet-in-the-middle problem (2016)
  10. Peyrin, Thomas; Seurin, Yannick: Counter-in-Tweak: authenticated encryption modes for tweakable block ciphers (2016)
  11. Reyhanitabar, Reza; Vaudenay, Serge; Vizár, Damian: Authenticated encryption with variable stretch (2016)
  12. Hoang, Viet Tung; Reyhanitabar, Reza; Rogaway, Phillip; Vizár, Damian: Online authenticated-encryption and its nonce-reuse misuse-resistance (2015)
  13. Fleischmann, Ewan; Forler, Christian; Lucks, Stefan: McOE: a family of almost foolproof on-line authenticated encryption schemes (2012)