scholarly journals Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES)

Author(s):  
D. Harkins
Author(s):  
Mahidhara Reddy Kankara

Abstract: Elections make a fundamental contribution to democratic governance but a lack of trust among citizens on their electoral system is a hindrance to satisfy the legal requirements of legislators. Even the world’s largest democratic countries suffer from issues like vote rigging, election manipulation and hacking of the electronic voting machines in the current voting system. To provide data security for e-Voting systems, the advanced encryption standard (AES) algorithm has been proposed, but traditional AES gives the same ciphertext for every similar pair of key and plaintext. So, to eliminate these disadvantages, AES in Galois-counter mode (GCM) has been used to obtain different ciphertexts all the time by using Initialization Vector. The fingerprint data from each user is verified using Internet of Things (IoT) based Biometric system which also helps to avoid Plural Voting. The whole data is encrypted and stored in the cloud, and it can be decrypted by authorized personnel to obtain the final vote count. So, the proposed model will enhance transparency and maintain anonymity of the voters alongside providing an easily accessible secured voting system. Keywords: Advanced encryption standard, initialization vector, additional authenticated data, galois-counter mode, biometrics, security, ciphertext, authtag


Author(s):  
Jessy Ayala

The focus of this research is to analyze the results of encrypting audio using various authenticated encryption algorithms implemented in the Python cryptography library for ensuring authenticity and confidentiality of the original contents. The Advanced Encryption Standard (AES) is used as the underlying cryptographic primitive in conjunction with various modes including Galois Counter Mode (GCM), Counter with Cipher Block Chaining Message Authentication Code (CCM), and Cipher Block Chaining (CBC) with Keyed-Hashing for encrypting a relatively small audio file. The resulting encrypted audio shows similarity in the variance when encrypting using AES-GCM and AES-CCM. There is a noticeable reduction in variance of the performed encodings and an increase in the amount of time it takes to encrypt and decrypt the same audio file using AES-CBC with Keyed-Hashing. In addition, the corresponding encrypted using this mode audio spans a longer duration. As a result, AES should either have GCM or CCM for an efficient and reliable authenticated encryption integration within a workflow.


Cryptography ◽  
2018 ◽  
Vol 2 (4) ◽  
pp. 42
Author(s):  
Jonathan Trostle

In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse resistant. The main focus for this work is minimizing ciphertext expansion, especially for short messages including plaintext lengths less than the underlying block cipher length (e.g., 16 bytes). For many existing AEAD schemes, a successful forgery leads directly to a loss of confidentiality. For CMCC, changes to the ciphertext randomize the resulting plaintext, thus forgeries do not necessarily result in a loss of confidentiality which allows us to reduce the length of the authentication tag. For protocols that send short messages, our scheme is similar to Synthetic Initialization Vector (SIV) mode for computational overhead but has much smaller expansion. We prove both a misuse resistant authenticated encryption (MRAE) security bound and an authenticated encryption (AE) security bound for CMCC. We also present a variation of CMCC, CWM (CMCC With MAC), which provides a further strengthening of the security bounds.


Author(s):  
I Made Sukarsa ◽  
I Made Rama Pradana ◽  
Putu Wira Buana

Communication via sockets is used to transmit information between applications or between processes over network or locally. ZeroMQ is a library for sending messages using sockets that are quite well known. Talking about sending data, message security is an important part that needs to be taken into account, especially when sending data over a network. ZeroMQ sends messages openly without securing the messages sent. This is evidenced by research which states that ZeroMQ does not have a security layer for sending messages over the network and direct observation of message packets using the wireshark application. Therefore, this study creates a method of securing and authenticating message delivery using AES (Advanced Encryption Standard) CBC (Cipher Block Chaining) mode combined with an authentication method. The AES CBC mode was chosen because it is faster than other methods and has strong encryption. This encryption and authentication are used so that the sender and recipient of the message are both valid senders and recipients so that no message changes during message delivery and messages can only be opened by the message recipient and the sender of the message. Tests are conducted to measure the effect of encryption and authentication on message delivery performance. Based on the tests conducted, there is an increase of 7% from normal delivery speed and the potential for messages is not up to 0.3% - 1.5%.


2009 ◽  
Vol 29 (8) ◽  
pp. 2200-2203
Author(s):  
Guo-liang DING ◽  
Zhi-xiang LI ◽  
Wen-long YING ◽  
Qiang ZHAO

2010 ◽  
Vol 7 (7) ◽  
pp. 1-11
Author(s):  
Abdulkarim Shtewi ◽  
Bahaa Eldin Hasan ◽  
Abd El Fatah Hegazy

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


Sign in / Sign up

Export Citation Format

Share Document