Next Article in Journal
Further Observations on SIMON and SPECK Block Cipher Families
Next Article in Special Issue
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
Previous Article in Journal
Security Incident Information Exchange for Cloud Service Provisioning Chains
Previous Article in Special Issue
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
Article Menu

Export Article

Open AccessArticle
Cryptography 2018, 2(4), 42; https://doi.org/10.3390/cryptography2040042

CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion

Independent Researcher, Vancouver, WA 98684, USA
Received: 21 September 2018 / Revised: 5 November 2018 / Accepted: 4 December 2018 / Published: 19 December 2018
(This article belongs to the Special Issue Authenticated Encryption)
Full-Text   |   PDF [597 KB, uploaded 20 December 2018]   |  

Abstract

In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse resistant. The main focus for this work is minimizing ciphertext expansion, especially for short messages including plaintext lengths less than the underlying block cipher length (e.g., 16 bytes). For many existing AEAD schemes, a successful forgery leads directly to a loss of confidentiality. For CMCC, changes to the ciphertext randomize the resulting plaintext, thus forgeries do not necessarily result in a loss of confidentiality which allows us to reduce the length of the authentication tag. For protocols that send short messages, our scheme is similar to Synthetic Initialization Vector (SIV) mode for computational overhead but has much smaller expansion. We prove both a misuse resistant authenticated encryption (MRAE) security bound and an authenticated encryption (AE) security bound for CMCC. We also present a variation of CMCC, CWM (CMCC With MAC), which provides a further strengthening of the security bounds. View Full-Text
Keywords: energy constrained cryptography; authenticated encryption; misuse resistance energy constrained cryptography; authenticated encryption; misuse resistance
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Trostle, J. CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion. Cryptography 2018, 2, 42.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top