Back to Search Start Over

A fundamental flaw in the ++AE authenticated encryption mode

Authors :
Qahur Al Mahri, Hassan Musallam Ahmed
Simpson, Leonie
Bartlett, Harry
Dawson, Ed
Wong, Kenneth
Qahur Al Mahri, Hassan Musallam Ahmed
Simpson, Leonie
Bartlett, Harry
Dawson, Ed
Wong, Kenneth
Source :
Journal of Mathematical Cryptology
Publication Year :
2018

Abstract

In this article, we analyse a block cipher mode of operation for authenticated encryption known as ++AE (plus-plus-AE). We show that this mode has a fundamental flaw: the scheme does not verify the most significant bit of any block in the plaintext message. This flaw can be exploited by choosing a plaintext message and then constructing multiple forged messages in which the most significant bit of certain blocks is flipped. All of these plaintext messages will generate the same authentication tag. This forgery attack is deterministic and guaranteed to pass the ++AE integrity check. The success of the attack is independent of the underlying block cipher, key or public message number. We outline the mathematical proofs for the flaw in the ++AE algorithm. We conclude that ++AE is insecure as an authenticated encryption mode of operation.

Details

Database :
OAIster
Journal :
Journal of Mathematical Cryptology
Notes :
application/pdf
Publication Type :
Electronic Resource
Accession number :
edsoai.on1287983631
Document Type :
Electronic Resource