Journal on Communications ›› 2023, Vol. 44 ›› Issue (8): 168-178.doi: 10.11959/j.issn.1000-436x.2023159

• Papers • Previous Articles    

AEUR: authenticated encryption algorithm design based on uBlock round function

Yatao YANG1,2, Hui DONG1, Jiantao LIU1, Yanshuo ZHANG1   

  1. 1 Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China
    2 School of Telecommunication Engineering, Xidian University, Xi’an 710071, China
  • Revised:2023-08-14 Online:2023-08-01 Published:2023-08-01
  • Supported by:
    Beijing Natural Science Foundation(4232034);The Fundamental Research Funds for the Central Universities(328202222);National First-Class Under Graduate Dicipline Construction of “Communication Engineering” and “Electronic Information Engineering”

Abstract:

In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function, with resistance to internal collision attacks as the security objective, a mixed integer linear programming approach was used to search for generic iterative component R(t,s) to meet the security objective.Secondly, the authenticated encryption algorithm AEUR was designed by using this component.AEUR consisted of two parts: authenticated encryption and decrypted verification, both of which performed the same process without the need to design additional operational sessions, reducing the algorithm’s resource consumption.In addition, the correctness of the algorithm was verified by comparing the corresponding round state values, and the security of the algorithm was analyzed using various analysis methods such as linear attacks and sliding attacks.Finally, the algorithm was implemented in C language to prove the AEUR has good performance.The results show that the proposed algorithm has a better overall performance in terms of software runtime, with efficiency improvements of 3% and 46% compared to AEGIS and ALE, and 74% and 92% compared to AES-GCM and ACORN, respectively.

Key words: authenticated encryption, block cipher uBlock, security analysis, software implementation

CLC Number: 

No Suggested Reading articles found!