• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Constructions and Security Analyses of Authenticated Encryption Schemes

Research Project

Project/Area Number 26280045
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypePartial Multi-year Fund
Section一般
Research Field Information security
Research InstitutionNagoya University

Principal Investigator

Iwata Tetsu  名古屋大学, 工学研究科, 准教授 (90344837)

Project Period (FY) 2014-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥16,900,000 (Direct Cost: ¥13,000,000、Indirect Cost: ¥3,900,000)
Fiscal Year 2017: ¥3,770,000 (Direct Cost: ¥2,900,000、Indirect Cost: ¥870,000)
Fiscal Year 2016: ¥4,940,000 (Direct Cost: ¥3,800,000、Indirect Cost: ¥1,140,000)
Fiscal Year 2015: ¥4,030,000 (Direct Cost: ¥3,100,000、Indirect Cost: ¥930,000)
Fiscal Year 2014: ¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Keywords暗号・認証等 / 共通鍵暗号技術 / 認証暗号化方式
Outline of Final Research Achievements

We studied authenticated encryption, a symmetric key primitive for privacy and authenticity. As our main results, we analyzed the security of various authenticated encryption schemes including GCM, CLOC, and SILC. We also studied the security of a block cipher called SIMON. We designed a message authentication scheme based on a tweakable block cipher. Finally, we contributed to the international competition called CAESAER, and organized international conferences DIAC 2016 and ASK 2016. Our proposal to CAESAR, CLOC and SILC, were not selected as the final round candidates.

Report

(5 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Annual Research Report
  • 2015 Annual Research Report
  • 2014 Annual Research Report

Research Products

(41 results)

All 2018 2017 2016 2015 2014 Other

All Int'l Joint Research (5 results) Journal Article (6 results) (of which Int'l Joint Research: 1 results,  Peer Reviewed: 6 results,  Open Access: 3 results,  Acknowledgement Compliant: 2 results) Presentation (28 results) (of which Int'l Joint Research: 12 results,  Invited: 8 results) Funded Workshop (2 results)

  • [Int'l Joint Research] Nanyang Technological University(シンガポール)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] ANSSI(フランス)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] Indian Statistical Institute, Kolkata(インド)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] Nanyang Technological University(シンガポール)

    • Related Report
      2016 Annual Research Report
  • [Int'l Joint Research] Nanyang Technological University(シンガポール)

    • Related Report
      2015 Annual Research Report
  • [Journal Article] On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants2018

    • Author(s)
      Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E101-A(1) Issue: 1 Pages: 88-98

    • DOI

      10.1587/transfun.e101.a.88

      10.1587/transfun.E101.A.88

    • NAID

      130006300890

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis of PMACx, PMAC2x, and SIVx2017

    • Author(s)
      Kazuhiko Minematsu and Tetsu Iwata
    • Journal Title

      IACR ToSC, FSE 2018

      Volume: 2 Pages: 162-176

    • DOI

      10.13154/tosc.v2017.i2.162-176

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Reconsidering the Security Bound of AES-GCM-SIV2017

    • Author(s)
      Tetsu Iwata and Yannick Seurin
    • Journal Title

      IACR ToSC, FSE 2018

      Volume: 4 Pages: 240-267

    • DOI

      10.13154/tosc.v2017.i4.240-267

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers2017

    • Author(s)
      Kazuya Imamura, Kazuhiko Minematsu, and Tetsu Iwata
    • Journal Title

      International Journal of Information Security, IJIS

      Volume: Online first

    • DOI

      10.1007/s10207-017-0378-9

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Stronger Security Variants of GCM-SIV2016

    • Author(s)
      Tetsu Iwata and Kazuhiko Minematsu
    • Journal Title

      ToSC, FSE 2017

      Volume: 1 Pages: 134-157

    • DOI

      10.13154/tosc.v2016.i1.134-157

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Optimality of Tweak Functions in CLOC2015

    • Author(s)
      Hayato Kobayashi, Kazuhiko Minematsu, and Tetsu Iwata
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E98-A(10) Issue: 10 Pages: 2152-2164

    • DOI

      10.1587/transfun.e98.a.2152

      10.1587/transfun.E98.A.2152

    • NAID

      130005100667

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Presentation] Tweakableブロック暗号から構成されたブロック暗号の選択暗号文攻撃に対する安全性証明2018

    • Author(s)
      中道良太,岩田哲
    • Organizer
      2018年暗号と情報セキュリティシンポジウム,SCIS 2018
    • Related Report
      2017 Annual Research Report
  • [Presentation] 4ラウンドFeistel暗号に対する量子選択暗号文攻撃2018

    • Author(s)
      伊藤玄武,岩田哲,松本隆太郎
    • Organizer
      2018年暗号と情報セキュリティシンポジウム,SCIS 2018
    • Related Report
      2017 Annual Research Report
  • [Presentation] QCCA on Feistel2018

    • Author(s)
      Gembu Ito, Tetsu Iwata, and Ryutaroh Matsumoto
    • Organizer
      Dagstuhl Seminar, Symmetric Cryptography, 18021
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] MILPソルバによるRelated-keyモデルにおけるSimon32の差分解読法に対する安全性解析2017

    • Author(s)
      近藤倖大,佐々木悠,藤堂洋介,岩田哲
    • Organizer
      SCIS 2017
    • Place of Presentation
      那覇市
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] Simon32とパラメータを変更したSimon32のゼロ相関攻撃,Integral 攻撃,不能差分攻撃に対する安全性比較2017

    • Author(s)
      大山武浩,近藤倖大,岩田哲
    • Organizer
      SCIS 2017
    • Place of Presentation
      那覇市
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] SILC Is INT-RUP Secure2017

    • Author(s)
      Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka, and Eita Kobayashi
    • Organizer
      ESC 2017
    • Place of Presentation
      ルクセンブルク
    • Year and Date
      2017-01-16
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] How to Improve AEAD-{2a, 4a} and DAEAD-2a2017

    • Author(s)
      Kazuya Imamura and Tetsu Iwata
    • Organizer
      IWSEC 2017, poster session
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials2017

    • Author(s)
      Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata
    • Organizer
      IWSEC 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] ZMAC: Specification Review, Security Proof, and Instantiation Updates2017

    • Author(s)
      Tetsu Iwata
    • Organizer
      7th Asian Workshop on Symmetric Key Cryptography, ASK 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Blockcipher-based Authenticated Encryption: How Small Can We Go?2017

    • Author(s)
      Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, and Mridul Nandi
    • Organizer
      CHES 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication2017

    • Author(s)
      Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, and Yannick Seurin
    • Organizer
      CRYPTO 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Breaking and Repairing Security Proofs of Authenticated Encryption Schemes2016

    • Author(s)
      Tetsu Iwata
    • Organizer
      Indocrypt 2016
    • Place of Presentation
      インド
    • Year and Date
      2016-12-11
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers2016

    • Author(s)
      Kazuya Imamura, Kazuhiko Minematsu, and Tetsu Iwata
    • Organizer
      ProvSec 2016
    • Place of Presentation
      中国
    • Year and Date
      2016-12-10
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Updates on CLOC and SILC Version 32016

    • Author(s)
      Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka, and Eita Kobayashi
    • Organizer
      DIAC 2016
    • Place of Presentation
      名古屋市
    • Year and Date
      2016-09-25
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants2016

    • Author(s)
      Kota Kondo, Yu Sasaki, and Tetsu Iwata
    • Organizer
      ACNS 2016
    • Place of Presentation
      英国
    • Year and Date
      2016-06-19
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 認証暗号とCAESAR2016

    • Author(s)
      岩田哲
    • Organizer
      2016 年総合大会,電子情報通信学会
    • Place of Presentation
      九州大学(福岡県・福岡市)
    • Year and Date
      2016-03-15
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] ChaCha20-Poly1305のNonce-MisuseとDecryption-Misuse耐性2016

    • Author(s)
      今村和弥,岩田哲
    • Organizer
      2016年暗号と情報セキュリティシンポジウム,SCIS 2016
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ(熊本県・熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] パラメータを変更したSIMON型ブロック暗号におけるIntegral攻撃と不能差分攻撃に対する安全性解析2016

    • Author(s)
      近藤倖大,佐々木悠,岩田哲
    • Organizer
      2016年暗号と情報セキュリティシンポジウム,SCIS 2016
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ(熊本県・熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] On GCM-SIV2016

    • Author(s)
      Tetsu Iwata and Kazuhiko Minematsu
    • Organizer
      Dagstuhl Seminar, Symmetric Cryptography, 16021
    • Place of Presentation
      Dagstuhl (Germany)
    • Year and Date
      2016-01-10
    • Related Report
      2015 Annual Research Report
  • [Presentation] Tweak-Length Extension for Tweakable Blockciphers2015

    • Author(s)
      Kazuhiko Minematsu and Tetsu Iwata
    • Organizer
      15th IMA International Conference, IMACC 2015
    • Place of Presentation
      Oxford (UK)
    • Year and Date
      2015-12-15
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Provable Security Bounds of GCM2015

    • Author(s)
      Shohei Ando, Kazuhiko Minematsu, and Tetsu Iwata
    • Organizer
      5th Asian Workshop on Symmetric Key Cryptography, ASK 2015
    • Place of Presentation
      Singapore
    • Year and Date
      2015-09-30
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] Updates on CLOC and SILC2015

    • Author(s)
      Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka, and Eita Kobayashi
    • Organizer
      Directions in Authenticated Ciphers, DIAC 2015
    • Place of Presentation
      Singapore
    • Year and Date
      2015-09-27
    • Related Report
      2015 Annual Research Report
  • [Presentation] GCM Security Bounds Reconsidered2015

    • Author(s)
      Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, and Tetsu Iwata
    • Organizer
      Fast Software Encryption, FSE 2015
    • Place of Presentation
      Istanbul (Turkey)
    • Year and Date
      2015-03-08 – 2015-03-11
    • Related Report
      2014 Annual Research Report
  • [Presentation] CLOC におけるTweak 関数の最適性2015

    • Author(s)
      小林 隼人,峯松一彦,岩田 哲
    • Organizer
      2015年暗号と情報セキュリティシンポジウム,SCIS 2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県・北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] On Tweak Functions in CLOC2015

    • Author(s)
      Hayato Kobayashi, Kazuhiko Minematsu, and Tetsu Iwata
    • Organizer
      Early Symmetric Crypto (ESC) seminar
    • Place of Presentation
      Clervaux (Luxembourg)
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] More on Generic Composition2015

    • Author(s)
      Kazuhiko Minematsu and Tetsu Iwata
    • Organizer
      Early Symmetric Crypto (ESC) seminar
    • Place of Presentation
      Clervaux (Luxembourg)
    • Year and Date
      2015-01-12 – 2015-01-16
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] Security of the Galois/Counter Mode of Operation2014

    • Author(s)
      Tetsu Iwata
    • Organizer
      TCCM-CACR
    • Place of Presentation
      Beijing (China)
    • Year and Date
      2014-09-26 – 2014-09-27
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] SILC: SImple Lightweight CFB2014

    • Author(s)
      Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka, and Eita Kobayashi
    • Organizer
      Directions in Authenticated Ciphers, DIAC 2014
    • Place of Presentation
      Santa Barbara (USA)
    • Year and Date
      2014-08-22 – 2014-08-24
    • Related Report
      2014 Annual Research Report
  • [Funded Workshop] ASK 2016, 6th Asian Workshop on Symmetric Key Cryptography2016

    • Place of Presentation
      名古屋市
    • Year and Date
      2016-09-28
    • Related Report
      2016 Annual Research Report
  • [Funded Workshop] DIAC 2016, Directions in Authenticated Ciphers2016

    • Place of Presentation
      名古屋市
    • Year and Date
      2016-09-25
    • Related Report
      2016 Annual Research Report

URL: 

Published: 2014-04-04   Modified: 2019-03-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi