Abstract | ||
---|---|---|
Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these flaws. In this paper, we show that the modified schemes proposed by Chen are not secure. In particular, we present an attack that allows a dishonest referee, in case of a dispute, to decrypt all the future and past authenticated ciphertext between the contended parties. We also present a simple fix to prevent this attack. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1016/j.compeleceng.2010.09.001 | Computers & Electrical Engineering |
Keywords | Field | DocType |
electrical engineering,authenticated encryption | Authentication,Chen,Computer security,Computer science,Computer network,Encryption,Ciphertext,Authenticated encryption | Journal |
Volume | Issue | ISSN |
37 | 1 | 0045-7906 |
Citations | PageRank | References |
1 | 0.38 | 10 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohamed M. Nasreldin Rasslan | 1 | 10 | 3.13 |
Amr Youssef | 2 | 238 | 29.69 |