General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2018 Vol.10(6): 185-189 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2018.V10.1223

A Proposed Solutions to Two Possible Attacks over AEGIS Authenticated Encryption Algorithm

Ayman Y. El-Hadary, Mohamed Helmy Megahed, and Mohamed H. Abd ElAzeem

Abstract—Authenticated Encryption (AE) is a technique combines both security and authenticity of data. This paper introduces two possible attacks over AEGIS AE algorithm, which are error propagation and tag changing attacks. The first attack is sending incorrect ciphertext for error propagation, that will results in incorrect decryption of all next ciphertexts then retransmission is done which leads to large time delay. The second attack is changing the sent authenticated tag that will result incorrect tag calculation at the receiver. Tag Generation functions dependent on XOR function (linear function) as in AEGIS make the encryption algorithms vulnerable to tag changing attack. In the introduced paper, the proposed solutions are done regarding two security mechanisms which are tag partitioning and check tag resulted from nonlinear function. Tag partitioning is a process to divide the tag into parts this will reduce the time delay of retransmission and non-linear function usage to overcome XOR function problems.

Index Terms—AEGIS, AE, check tag, tag authentication, tag generation, tag partitioning.

Ayman Yousry El-Hadary is with the Department of Electronics and Communication, Cairo, Egypt (e-mail: a.elhadary99@yahoo.co.uk). Mohamed Helmy Megahed is with the Communications Department of Canadian International College (CIC), Cairo, Egypt (e-mail: mmega080@uottawa.ca). Mohamed Hassan Abd ElAzeim is with the Department of Electronics and Communication of Arab Academy for Science Technology and Maritime Transport (AASTMT), Cairo, Egypt (e-mail: mhabdazeem@hotmail.com).

[PDF]

Cite:Ayman Y. El-Hadary, Mohamed Helmy Megahed, and Mohamed H. Abd ElAzeem, "A Proposed Solutions to Two Possible Attacks over AEGIS Authenticated Encryption Algorithm," International Journal of Computer Theory and Engineering vol. 10, no. 6, pp. 185-189, 2018.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.