Authenticated encryption schemes: A systematic review

Jimale, Mohamud Ahmed and Z'aba, Muhammad Reza and Kiah, Miss Laiha Binti Mat and Idris, Mohd Yamani Idna and Jamil, Norziana and Mohamad, Moesfa Soeheila and Rohmad, Mohd Saufy (2022) Authenticated encryption schemes: A systematic review. IEEE Access, 10. pp. 14739-14766. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2022.3147201.

Full text not available from this repository.

Abstract

Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features.

Item Type: Article
Funders: Fundamental Research Grant Scheme (FRGS) of the Ministry of Higher Education, Malaysia [Grant No: FP072-2019A & FRGS/1/2019/ICT05/UM/02/1]
Uncontrolled Keywords: Encryption; Cryptography; Security; NIST; Authentication; Systematics; Classification algorithms; Authenticated encryption; CAESAR competition; Confidentiality; Integrity; Message authentication code; NIST-LW competition
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > TA Engineering (General). Civil engineering (General)
Divisions: Faculty of Computer Science & Information Technology
Depositing User: Ms. Juhaida Abd Rahim
Date Deposited: 27 Jul 2022 07:11
Last Modified: 27 Jul 2022 07:11
URI: http://eprints.um.edu.my/id/eprint/33556

Actions (login required)

View Item View Item