Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes

Mohamed RASSLAN  Amr YOUSSEF  

Publication
IEICE TRANSACTIONS on Information and Systems   Vol.E93-D   No.5   pp.1301-1302
Publication Date: 2010/05/01
Online ISSN: 1745-1361
DOI: 10.1587/transinf.E93.D.1301
Print ISSN: 0916-8532
Type of Manuscript: LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
authenticated encryption,  authenticity,  non-repudiation,  

Full Text: PDF>>
Buy this Article




Summary: 
Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for message flows. Hwang et al. (IEICE Trans. Inf. and Syst., Vol. E89-D, No. 4, April 2006) presented a forgery attack against these two schemes and proposed an improvement that they claim resists such attacks. In this paper, we show that the improved authenticated encryption schemes proposed by Hwang et al. are not secure by presenting another message forgery attack against these improved schemes.