Authentication encryption cryptosystem with~derived~one-time~keys
Prikladnaâ diskretnaâ matematika, no. 4 (2020), pp. 51-61.

Voir la notice de l'article provenant de la source Math-Net.Ru

A research of the previously proposed by the author mathematical model of authenticated encryption cryptosystem based on authentication code with secrecy is continued. An encryption algorithm uses calculations in the fields of characteristics two, a counters sequence depending on the key, one-time derived keys defined by the main key and initialization vectors using orthogonal Latin squares, and a polynomial-type MAC. A byte method for implementing the algorithm is proposed and compared with the standardized GCM cryptographic algorithm. The choice of model parameters that guarantee provable security to ciphertext-based attacks is proposed. The analysis of the cryptosystem's security to chosen-plaintext attacks is performed.
Keywords: authenticated encryption cryptosystem, GCM, orthogonal Latin squares, provable security, ciphertext-based attacks, chosen-plaintext attacks.
Mots-clés : quasigroup
@article{PDM_2020_4_a2,
     author = {A. Yu. Zubov},
     title = {Authentication encryption cryptosystem with~derived~one-time~keys},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {51--61},
     publisher = {mathdoc},
     number = {4},
     year = {2020},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2020_4_a2/}
}
TY  - JOUR
AU  - A. Yu. Zubov
TI  - Authentication encryption cryptosystem with~derived~one-time~keys
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2020
SP  - 51
EP  - 61
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2020_4_a2/
LA  - ru
ID  - PDM_2020_4_a2
ER  - 
%0 Journal Article
%A A. Yu. Zubov
%T Authentication encryption cryptosystem with~derived~one-time~keys
%J Prikladnaâ diskretnaâ matematika
%D 2020
%P 51-61
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2020_4_a2/
%G ru
%F PDM_2020_4_a2
A. Yu. Zubov. Authentication encryption cryptosystem with~derived~one-time~keys. Prikladnaâ diskretnaâ matematika, no. 4 (2020), pp. 51-61. http://geodesic.mathdoc.fr/item/PDM_2020_4_a2/

[1] A. Yu. Zubov, “Authentication encryption based on authentication code with secrecy”, Prikladnaya Diskretnaya Matematika, 2019, no. 43, 60–69 (in Russian)

[2] V. N. Sachkov, Introduction to Combinatorial Methods of Discrete Mathematics, MCCME, M., 2004, 424 pp. (in Russian)

[3] D. McGrew, J. Viega, “The security and performance of Galois/Counter mode of operation”, LNCS, 3348, 2004, 343–355

[4] J. Viega, D. McGrew, Galois/Counter mode (GCM) overview fibre channel security protocols, Cisco Systems Inc., 2005, 32 pp.

[5] A. Yu. Zubov, “Almost perfect ciphers and authentication codes”, Prikladnaya Diskretnaya Matematika, 2011, no. 4 (14), 28–33 (in Russian)

[6] A. Yu. Zubov, “On the concept of a $\varepsilon$-perfect cipher”, Prikladnaya Diskretnaya Matematika, 2016, no. 3 (33), 45–52 (in Russian)