• Mar 05, 2019 News!Vol.11, No.1 has been published with online version.   [Click]
  • Aug 06, 2018 News!Vol.9, No.1-Vol.9, No.4 have been indexed by EI (Inspec).   [Click]
  • Dec 29, 2018 News!Vol.10, No.6 has been published with online version.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2018 Vol.10(6): 185-189 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2018.V10.1223

A Proposed Solutions to Two Possible Attacks over AEGIS Authenticated Encryption Algorithm

Ayman Y. El-Hadary, Mohamed Helmy Megahed, and Mohamed H. Abd ElAzeem
Abstract—Authenticated Encryption (AE) is a technique combines both security and authenticity of data. This paper introduces two possible attacks over AEGIS AE algorithm, which are error propagation and tag changing attacks. The first attack is sending incorrect ciphertext for error propagation, that will results in incorrect decryption of all next ciphertexts then retransmission is done which leads to large time delay. The second attack is changing the sent authenticated tag that will result incorrect tag calculation at the receiver. Tag Generation functions dependent on XOR function (linear function) as in AEGIS make the encryption algorithms vulnerable to tag changing attack. In the introduced paper, the proposed solutions are done regarding two security mechanisms which are tag partitioning and check tag resulted from nonlinear function. Tag partitioning is a process to divide the tag into parts this will reduce the time delay of retransmission and non-linear function usage to overcome XOR function problems.

Index Terms—AEGIS, AE, check tag, tag authentication, tag generation, tag partitioning.

Ayman Yousry El-Hadary is with the Department of Electronics and Communication, Cairo, Egypt (e-mail: a.elhadary99@yahoo.co.uk). Mohamed Helmy Megahed is with the Communications Department of Canadian International College (CIC), Cairo, Egypt (e-mail: mmega080@uottawa.ca). Mohamed Hassan Abd ElAzeim is with the Department of Electronics and Communication of Arab Academy for Science Technology and Maritime Transport (AASTMT), Cairo, Egypt (e-mail: mhabdazeem@hotmail.com).

[PDF]

Cite:Ayman Y. El-Hadary, Mohamed Helmy Megahed, and Mohamed H. Abd ElAzeem, "A Proposed Solutions to Two Possible Attacks over AEGIS Authenticated Encryption Algorithm," International Journal of Computer Theory and Engineering vol. 10, no. 6, pp. 185-189, 2018.

Copyright © 2008-2019. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@iacsitp.com