搜索结果: 1-15 共查到“知识库 GCM”相关记录69条 . 查询时间(0.093 秒)
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
cryptographic protocols Nonce Randomization
2018/11/5
Multi-user (mu) security considers large-scale attackers (e.g., state actors) that given access to a number of sessions, attempt to compromise {\em at least} one of them. Mu security of authenticated ...
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
side-channel cache attacks
2018/6/25
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to create a Trusted Execution Environment (TEE) called a Secure World, which runs secure processes (Trust...
Optimal Forgeries Against Polynomial-Based MACs and GCM
forgery Wegman-Carter authenticator
2018/3/6
Polynomial-based authentication algorithms, such as GCM and Poly1305, have seen widespread adoption in practice. Due to their importance, a significant amount of attention has been given to understand...
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Multi-user security AES-GCM-SIV authenticated encryption
2018/2/8
This paper revisits the multi-user (mu) security of symmetric encryption, from the perspective of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its mu security is co...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption scheme currently considered for standardization by the Crypto Forum Research Group (CFRG). First, we p...
Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying
key lifetime re-keying key diversification
2017/7/24
In this paper we introduce a classification of existing approaches to increase the security of block cipher operation modes based on re-keying, putting the focus on so-called internal re-keying withou...
AES-GCM-SIV: Specification and Analysis
modes of operation nonce-misuse resistance security bounds
2017/2/24
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined in the CFRG specification \cite{CFRG}. This mode differs from the original GCM-SIV mode that was de...
电离层电流产生的磁场是地磁场卫星测绘时需要剔除的干扰源.利用电离层热层模式TIE-GCM计算电离层中的中性风、重力驱动和压强梯度等形成的电离层电流的全球分布,分析电流在特定位置产生的磁场及磁场三分量随纬度的变化规律.结果表明,E层尤其是磁赤道和极区的电流密度较大,可达103nA·m-2量级,F层电流密度量级约为10nA·m-2.在磁静日(Kp≤ 1)夜间22:00LT-04:00LT,电离层电流在...
Stronger Security Variants of GCM-SIV
GCM-SIV nonce-reuse misuse-resistance authenticated encryption provable security
2016/12/10
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated. While this is an advantage over the original GCM,...
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
authenticated encryption TLS 1.3 multi-user security
2016/6/6
We initiate the study of multi-user (mu) security of authenticated encryption (AE) schemes as
a way to rigorously formulate, and answer, questions about the “randomized nonce” mechanism
proposed for...
We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, the most widely deployed variant. With an Internet-wide scan we identified 184 HTTPS...
Twisted Polynomials and Forgery Attacks on GCM
Authenticated encryption polynomial hashing twisted polynomial ring (Ore ring)
2016/1/27
Polynomial hashing as an instantiation of universal hashing
is a widely employed method for the construction of MACs and authenticated
encryption (AE) schemes, the ubiquitous GCM being a prominent
...
Low-Cost Concurrent Error Detection for GCM and CCM
concurrent error detection fault attack reliability, GCM
2016/1/6
In many applications, encryption alone does not provide enough security.
To enhance security, dedicated authenticated encryption (AE) mode are invented.
Galios Counter Mode (GCM) and Counter with CB...
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
modes of operation authenticated encryption nonce misuse resistance
2016/1/4
Authenticated encryption schemes guarantee both privacy
and integrity, and have become the default level of encryption in modern
protocols. One of the most popular authenticated encryption schemes
...
A constant of 222 appears in the security bounds of the Galois/Counter Mode of Operation,
GCM. In this paper, we first develop an algorithm to generate nonces that have a high
counter-collision prob...