The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Tseng et coll. a proposé deux schémas de chiffrement authentifiés efficaces avec des liaisons de messages pour les flux de messages. Hwang et coll. (IEICE Trans. Inf. et Syst., Vol. E89-D, n° 4, avril 2006) a présenté une attaque contre ces deux systèmes et proposé une amélioration qui, selon eux, résiste à de telles attaques. Dans cet article, nous montrons que les schémas de chiffrement authentifiés améliorés proposés par Hwang et al. ne sont pas sécurisés en présentant une autre attaque de falsification de message contre ces systèmes améliorés.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Mohamed RASSLAN, Amr YOUSSEF, "Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes" in IEICE TRANSACTIONS on Information,
vol. E93-D, no. 5, pp. 1301-1302, May 2010, doi: 10.1587/transinf.E93.D.1301.
Abstract: Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Hwang et al. (IEICE Trans. Inf. and Syst., Vol. E89-D, No. 4, April 2006) presented a forgery attack against these two schemes and proposed an improvement that they claim resists such attacks. In this paper, we show that the improved authenticated encryption schemes proposed by Hwang et al. are not secure by presenting another message forgery attack against these improved schemes.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E93.D.1301/_p
Copier
@ARTICLE{e93-d_5_1301,
author={Mohamed RASSLAN, Amr YOUSSEF, },
journal={IEICE TRANSACTIONS on Information},
title={Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes},
year={2010},
volume={E93-D},
number={5},
pages={1301-1302},
abstract={Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Hwang et al. (IEICE Trans. Inf. and Syst., Vol. E89-D, No. 4, April 2006) presented a forgery attack against these two schemes and proposed an improvement that they claim resists such attacks. In this paper, we show that the improved authenticated encryption schemes proposed by Hwang et al. are not secure by presenting another message forgery attack against these improved schemes.},
keywords={},
doi={10.1587/transinf.E93.D.1301},
ISSN={1745-1361},
month={May},}
Copier
TY - JOUR
TI - Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
T2 - IEICE TRANSACTIONS on Information
SP - 1301
EP - 1302
AU - Mohamed RASSLAN
AU - Amr YOUSSEF
PY - 2010
DO - 10.1587/transinf.E93.D.1301
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E93-D
IS - 5
JA - IEICE TRANSACTIONS on Information
Y1 - May 2010
AB - Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Hwang et al. (IEICE Trans. Inf. and Syst., Vol. E89-D, No. 4, April 2006) presented a forgery attack against these two schemes and proposed an improvement that they claim resists such attacks. In this paper, we show that the improved authenticated encryption schemes proposed by Hwang et al. are not secure by presenting another message forgery attack against these improved schemes.
ER -