[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
:: Volume 4, Issue 2 (3-2016) ::
3 2016, 4(2): 67-86 Back to browse issues page
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition
Mohsen Rezaei, Reza Ebrahimi Atani
university of guilan
Abstract:   (4355 Views)

Authenticated Encryption is a block cipher mode of operation which simultaneously provides confidentiality, integrity, and authenticity assurances on the data transmition. In this regard in 2014 CAESAR competition started which aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. This paper provides an easy-to-grasp overview over functional aspects, security parameters, and robustness offerings of the CAESAR candidates, clustered by their underlying designs (block-cipher-, stream-cipher-, permutation-/sponge-, compression-function-based, dedicated) and compares encryption/decryption speed of all CAESAR candidates implemented on three processors of three different architectures  AMD64, armeabi and  mipso32.

Keywords: Confidentiality, cryptography, authentication encryption, software implementation, CAESAR Competition, AE
Full-Text [PDF 3405 kb]   (1260 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2016/08/27 | Accepted: 2016/11/21 | Published: 2016/11/21
Send email to the article author

Add your comments about this article
Your username or Email:


XML   Persian Abstract   Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Rezaei M, Ebrahimi Atani R. An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition. 3 2016; 4 (2) :67-86
URL: http://monadi.isc.org.ir/article-1-67-en.html

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 2 (3-2016) Back to browse issues page
دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 30 queries by YEKTAWEB 4540