introduction to authenticated encryption
play

Introduction to Authenticated Encryption Tom Shrimpton Summer - PowerPoint PPT Presentation

(A brief, incomplete) Introduction to Authenticated Encryption Tom Shrimpton Summer School on Real-World Crypto and Privacy June 11, 2018 Authenticated Encryption M M Its complicated Probabilistic or deterministic AE? Nonce based AE?


  1. (A brief, incomplete) Introduction to Authenticated Encryption Tom Shrimpton Summer School on Real-World Crypto and Privacy June 11, 2018

  2. Authenticated Encryption M M

  3. It’s complicated… Probabilistic or deterministic AE? Nonce based AE? What happens if a nonce repeats? Do I need to support associated data? What primitives should we build upon? encryption + MAC? (tweakable) wide-block cip sponges? ... What should happen when decryption fails? Is it safe to provide multiple, descriptive exceptions/error messages? Stop all future processing, or just for this message? What kind of information can decryption safely leak? Safe to release plaintext data “early”? Online encryption/decryption property? ”Atomic” plaintexts/ciphertexts, or stream-based? (Authenticated encryption != Secure Channel)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend