:: Volume 4, Issue 2 (3-2016) ::
منادی 2016, 4(2): 67-86 Back to browse issues page
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition
Mohsen Rezaei * , Reza Ebrahimi Atani
university of guilan
Abstract:   (5103 Views)

Authenticated Encryption is a block cipher mode of operation which simultaneously provides confidentiality, integrity, and authenticity assurances on the data transmition. In this regard in 2014 CAESAR competition started which aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. This paper provides an easy-to-grasp overview over functional aspects, security parameters, and robustness offerings of the CAESAR candidates, clustered by their underlying designs (block-cipher-, stream-cipher-, permutation-/sponge-, compression-function-based, dedicated) and compares encryption/decryption speed of all CAESAR candidates implemented on three processors of three different architectures  AMD64, armeabi and  mipso32.

Keywords: Confidentiality, cryptography, authentication encryption, software implementation, CAESAR Competition, AE
Full-Text [PDF 3405 kb]   (1457 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2016/08/27 | Accepted: 2016/11/21 | Published: 2016/11/21


XML   Persian Abstract   Print



Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 2 (3-2016) Back to browse issues page