AEGIS: A Fast Authenticated Encryption Algorithm View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2014-05-21

AUTHORS

Hongjun Wu , Bart Preneel

ABSTRACT

This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS-128 uses five AES round functions to process a 16-byte message block (one step); AES-256 uses six AES round functions. The security analysis shows that both algorithms offer a high level of security. On the Intel Sandy Bridge Core i5 processor, the speed of AEGIS is around 0.7 clock cycles/byte (cpb) for 4096-byte messages. This is comparable in speed to the CTR mode (that offers only encryption) and substantially faster than the CCM, GCM and OCB modes. More... »

PAGES

185-201

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10

DOI

http://dx.doi.org/10.1007/978-3-662-43414-7_10

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1032051449


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "School of Physical and Mathematical Sciences, Nanyang Technological University, Nanyang Link, Singapore", 
          "id": "http://www.grid.ac/institutes/grid.59025.3b", 
          "name": [
            "School of Physical and Mathematical Sciences, Nanyang Technological University, Nanyang Link, Singapore"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wu", 
        "givenName": "Hongjun", 
        "id": "sg:person.012702570012.45", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012702570012.45"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dept. Elektrotechniek-ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "Dept. Elektrotechniek-ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014-05-21", 
    "datePublishedReg": "2014-05-21", 
    "description": "This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS-128 uses five AES round functions to process a 16-byte message block (one step); AES-256 uses six AES round functions. The security analysis shows that both algorithms offer a high level of security. On the Intel Sandy Bridge Core i5 processor, the speed of AEGIS is around 0.7\u00a0clock cycles/byte (cpb) for 4096-byte messages. This is comparable in speed to the CTR mode (that offers only encryption) and substantially faster than the CCM, GCM and OCB modes.", 
    "editor": [
      {
        "familyName": "Lange", 
        "givenName": "Tanja", 
        "type": "Person"
      }, 
      {
        "familyName": "Lauter", 
        "givenName": "Kristin", 
        "type": "Person"
      }, 
      {
        "familyName": "Lison\u011bk", 
        "givenName": "Petr", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-662-43414-7_10", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-662-43413-0", 
        "978-3-662-43414-7"
      ], 
      "name": "Selected Areas in Cryptography -- SAC 2013", 
      "type": "Book"
    }, 
    "keywords": [
      "AES round function", 
      "Authenticated Encryption Algorithm", 
      "cycles/byte", 
      "round function", 
      "network packets", 
      "encryption algorithm", 
      "security analysis", 
      "CTR mode", 
      "i5 processor", 
      "AEGIS-128", 
      "AES-256", 
      "message blocks", 
      "OCB mode", 
      "algorithm", 
      "bytes", 
      "processors", 
      "security", 
      "packets", 
      "messages", 
      "speed", 
      "block", 
      "data", 
      "aegis", 
      "function", 
      "protection", 
      "mode", 
      "CCM", 
      "analysis", 
      "high levels", 
      "levels", 
      "GCM", 
      "paper"
    ], 
    "name": "AEGIS: A Fast Authenticated Encryption Algorithm", 
    "pagination": "185-201", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1032051449"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-43414-7_10"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-43414-7_10", 
      "https://app.dimensions.ai/details/publication/pub.1032051449"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-11-24T21:12", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221124/entities/gbq_results/chapter/chapter_147.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-662-43414-7_10"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10'


 

This table displays all metadata directly associated to this object as RDF triples.

111 TRIPLES      22 PREDICATES      56 URIs      49 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-43414-7_10 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N7b9e28d7ad354f2e9d36c948e732edd4
4 schema:datePublished 2014-05-21
5 schema:datePublishedReg 2014-05-21
6 schema:description This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS-128 uses five AES round functions to process a 16-byte message block (one step); AES-256 uses six AES round functions. The security analysis shows that both algorithms offer a high level of security. On the Intel Sandy Bridge Core i5 processor, the speed of AEGIS is around 0.7 clock cycles/byte (cpb) for 4096-byte messages. This is comparable in speed to the CTR mode (that offers only encryption) and substantially faster than the CCM, GCM and OCB modes.
7 schema:editor Nda354431db3a4f748221c675a0688d06
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Ne59b3cf83121450fa1cd37735fec5dca
11 schema:keywords AEGIS-128
12 AES round function
13 AES-256
14 Authenticated Encryption Algorithm
15 CCM
16 CTR mode
17 GCM
18 OCB mode
19 aegis
20 algorithm
21 analysis
22 block
23 bytes
24 cycles/byte
25 data
26 encryption algorithm
27 function
28 high levels
29 i5 processor
30 levels
31 message blocks
32 messages
33 mode
34 network packets
35 packets
36 paper
37 processors
38 protection
39 round function
40 security
41 security analysis
42 speed
43 schema:name AEGIS: A Fast Authenticated Encryption Algorithm
44 schema:pagination 185-201
45 schema:productId N60d75dcfee494044baa86a6b65653b10
46 N61d17771c0f34bbc913e1f74eb91a062
47 schema:publisher N9ad6533038684d46a3912b824e5e0f35
48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032051449
49 https://doi.org/10.1007/978-3-662-43414-7_10
50 schema:sdDatePublished 2022-11-24T21:12
51 schema:sdLicense https://scigraph.springernature.com/explorer/license/
52 schema:sdPublisher Nef7e10aec0254659a71f49b50d0cd36a
53 schema:url https://doi.org/10.1007/978-3-662-43414-7_10
54 sgo:license sg:explorer/license/
55 sgo:sdDataset chapters
56 rdf:type schema:Chapter
57 N5b9d6b12ad8740a885c6c926549c7b46 schema:familyName Lauter
58 schema:givenName Kristin
59 rdf:type schema:Person
60 N60d75dcfee494044baa86a6b65653b10 schema:name doi
61 schema:value 10.1007/978-3-662-43414-7_10
62 rdf:type schema:PropertyValue
63 N61d17771c0f34bbc913e1f74eb91a062 schema:name dimensions_id
64 schema:value pub.1032051449
65 rdf:type schema:PropertyValue
66 N7b9e28d7ad354f2e9d36c948e732edd4 rdf:first sg:person.012702570012.45
67 rdf:rest Nf3796bcf596f44f8907b217fc6c391ef
68 N83f35c58ef3f48a7993f30c75220f264 rdf:first Nb063d1ce67e146e7bf0f30ade5ff6d3f
69 rdf:rest rdf:nil
70 N9ad6533038684d46a3912b824e5e0f35 schema:name Springer Nature
71 rdf:type schema:Organisation
72 Nb063d1ce67e146e7bf0f30ade5ff6d3f schema:familyName Lisoněk
73 schema:givenName Petr
74 rdf:type schema:Person
75 Nc4a23496923a4928a8783fe8e1afc5b5 schema:familyName Lange
76 schema:givenName Tanja
77 rdf:type schema:Person
78 Nd5e9b29157054c22a582e13103992ff7 rdf:first N5b9d6b12ad8740a885c6c926549c7b46
79 rdf:rest N83f35c58ef3f48a7993f30c75220f264
80 Nda354431db3a4f748221c675a0688d06 rdf:first Nc4a23496923a4928a8783fe8e1afc5b5
81 rdf:rest Nd5e9b29157054c22a582e13103992ff7
82 Ne59b3cf83121450fa1cd37735fec5dca schema:isbn 978-3-662-43413-0
83 978-3-662-43414-7
84 schema:name Selected Areas in Cryptography -- SAC 2013
85 rdf:type schema:Book
86 Nef7e10aec0254659a71f49b50d0cd36a schema:name Springer Nature - SN SciGraph project
87 rdf:type schema:Organization
88 Nf3796bcf596f44f8907b217fc6c391ef rdf:first sg:person.011115044357.39
89 rdf:rest rdf:nil
90 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
91 schema:name Information and Computing Sciences
92 rdf:type schema:DefinedTerm
93 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
94 schema:name Data Format
95 rdf:type schema:DefinedTerm
96 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
97 schema:familyName Preneel
98 schema:givenName Bart
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
100 rdf:type schema:Person
101 sg:person.012702570012.45 schema:affiliation grid-institutes:grid.59025.3b
102 schema:familyName Wu
103 schema:givenName Hongjun
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012702570012.45
105 rdf:type schema:Person
106 grid-institutes:grid.5596.f schema:alternateName Dept. Elektrotechniek-ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium
107 schema:name Dept. Elektrotechniek-ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium
108 rdf:type schema:Organization
109 grid-institutes:grid.59025.3b schema:alternateName School of Physical and Mathematical Sciences, Nanyang Technological University, Nanyang Link, Singapore
110 schema:name School of Physical and Mathematical Sciences, Nanyang Technological University, Nanyang Link, Singapore
111 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...