Maximum strength of an authenticated encryption scheme like this

Published: 15/11/2017
Maximum strength of an authenticated encryption scheme like this
Source: CRYPTO.STACKEXCHANGE.COM

Assume that we have a authentication-capable block cipher with key size $k$ and block size $n$ where $n = 2 \times m$. The function used to encrypt blocks takes the block index $i$ as an additional input and returns an $m$-bit intermediate authentication tag $\phi_{i}$. At the end of the encryption process, the authentication tag $\Phi$ is produced. $\Phi$, unlike $\phi_{i}$, is $n$ bits in s

Read more
Related news
Comment