Abstract
An authenticated encryption scheme is a message transmission scheme, which sends messages in a secure and authentic way. In large message transmission, traditional authenticated encryption scheme has the disadvantage that the communication and the computation costs are too high. In 2002, Tseng-Jan proposed an efficient authenticated encryption scheme with messages linkage; that is, only a random number was used and the communication costs and the computational complexity were better than previously proposed schemes. The current paper, however, points out that Tseng-Jan’s scheme suffers from serious security faults such that any adversary can easily forge valid signature blocks and pass the receiver’s verification, and the scheme does not provide forward secrecy and non-repudiation. We also propose an improvement to the scheme to overcome the weaknesses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nyberg, K., Rueppel, R.A.: Message Recovery for Signature Schemes Based on the Discrete Logarithm. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 175–190. Springer, Heidelberg (1995)
Nyberg, K., Rueppel, R.A.: Message Recovery for Signature Schemes Based on the Discrete Logarithm. Designs, Codes and Cryptography 7, 61–81 (1996)
Horster, P., Michels, M., Petersen, H.: Authenticated Encryption Schemes with Low Communication Costs. Electronics Letters 30, 1212 (1994)
Lee, M., Kim, D., Park, K.: An Authenticated Encryption Scheme with Public Verifiability. In: Japan-Korea Joint Workshop on Algorithms and Computation (WAAC 2000), pp. 49–56 (2000)
Tseng, Y.M., Jan, J.K.: An Efficient Authenticated Encryption Scheme with Message Linkages and Low Communication Costs. Journal of Information Science and Engineering 18, 41–46 (2002)
Hwang, S.J., Chang, C.C., Yang, W.P.: Authenticated Encryption Schemes with Message Linkages. Information Processing Letters 58, 189–194 (1996)
Lee, W.B., Chang, C.C.: Authenticated Encryption Scheme without using a Oneway Hash Function. Electronics Letters 31, 1656–1657 (1995)
Lee, W.B., Chang, C.C.: Authenticated Encryption Schemes with Linkage between Message Blocks. Information Processing Letters 63, 247–250 (1997)
Chen, B.H.: Improvements of Authenticated Encryption Schemes With Message Linkages for Message Flows. Computers and Electrical Engineering 30, 465–469 (2004)
Boyar, J., Chaum, D., Damgard, I., Pederson, T.: Convertible Undeniable Signatures. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 189–205. Springer, Heidelberg (1991)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, EJ., Yoo, KY. (2005). Robust Authenticated Encryption Scheme with Message Linkages. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3684. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554028_40
Download citation
DOI: https://doi.org/10.1007/11554028_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28897-8
Online ISBN: 978-3-540-31997-9
eBook Packages: Computer ScienceComputer Science (R0)