Authenticated encryption: how reordering can impact performance

  • Authors:
  • Basel Alomair

  • Affiliations:
  • Computer Research Institute (CRI), King Abdulaziz City for Science and Technology (KACST), Saudi Arabia

  • Venue:
  • ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this work, we look at authenticated encryption schemes from a new perspective. As opposed to analyzing the security of different methods of constructing authenticated encryption schemes, we investigate the effect of the method used to construct an authenticated encryption scheme on the performance of the construction. We show that, by performing the authentication operation before the encryption operation, the security requirements on the authentication operation can be relaxed, leading to more efficient constructions, without affecting the security of the overall construction.