On the security of AEAD scheme is recommended for use in Signal protocol
DOI:
https://doi.org/10.54654/isj.v1i21.1028Keywords:
AEAD, authenticated encryption, SignalTóm tắt
Abstract— In this paper, we provide a security assessment for the authenticated encryption mode used in the recommendation of the Signal protocol. Furthermore, we found how tags are computed in Signal’s guidance differs slightly from the cited documentation. Our evaluation suggests how to choose the IV value to reduce the data storage space in the Signal protocol.
Downloads
References
Alwen, J., S. Coretti, and Y. Dodis. The double ratchet: security notions, proofs, and modularization for the signal protocol. in Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2019. Springer.
Rogaway, P. and T. Shrimpton. A provable-security treatment of the key-wrap problem. in Annual international conference on the theory and applications of cryptographic techniques. 2006. Springer.
Rogaway, P. Authenticated-encryption with associated-data. in Proceedings of the 9th ACM Conference on Computer and Communications Security. 2002.
Rogaway, P., Evaluation of some blockcipher modes of operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan, 2011. 630.
Bellare, M. New proofs for NMAC and HMAC: Security without collision-resistance. in Annual International Cryptology Conference. 2006. Springer.
Wang, X., Y.L. Yin, and H. Yu, Collision search attacks on SHA1. 2005, Feb.
Rijmen, V. and E. Oswald. Update on SHA-1. in Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings. 2005. Springer.
Manuel, S., Classification and generation of disturbance vectors for collision attacks against SHA-1. Designs, Codes and Cryptography, 2011. 59(1-3): p. 247-263.
Blog, G.S., Announcing the first SHA1 collision. 2017.
Leurent, G. and T. Peyrin. {SHA-1} is a shambles: First {Chosen-Prefix} collision on {SHA-1} and application to the {PGP} web of trust. in 29th USENIX Security Symposium (USENIX Security 20). 2020.
Long, N. V. (2020). Phân tích các thành phần mật mã trong hoán vị Keccak-p. Journal of Science and Technology on Information Security, 8(2), 34-45. https://doi.org/10.54654/isj.v8i2.31
Nguyen, A.T. and C.B. Nguyen, A new proof for the security of the keyed Sponge construction in the ideal compression function model. Journal of Science and Technology on Information security, 2019. 10(2): p. 18-24.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).