[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 4, Issue 2 (3-2016) ::
منادی 2016, 4(2): 67-86 Back to browse issues page
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition
Mohsen Rezaei * , Reza Ebrahimi Atani
university of guilan
Abstract:   (5868 Views)

Authenticated Encryption is a block cipher mode of operation which simultaneously provides confidentiality, integrity, and authenticity assurances on the data transmition. In this regard in 2014 CAESAR competition started which aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. This paper provides an easy-to-grasp overview over functional aspects, security parameters, and robustness offerings of the CAESAR candidates, clustered by their underlying designs (block-cipher-, stream-cipher-, permutation-/sponge-, compression-function-based, dedicated) and compares encryption/decryption speed of all CAESAR candidates implemented on three processors of three different architectures  AMD64, armeabi and  mipso32.

Keywords: Confidentiality, cryptography, authentication encryption, software implementation, CAESAR Competition, AE
Full-Text [PDF 3405 kb]   (1731 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2016/08/27 | Accepted: 2016/11/21 | Published: 2016/11/21
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Rezaei M, Ebrahimi Atani R. An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition. منادی 2016; 4 (2) :67-86
URL: http://monadi.isc.org.ir/article-1-67-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 2 (3-2016) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.11 seconds with 39 queries by YEKTAWEB 4704