AEGIS: A Fast Authenticated Encryption Algorithm View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2014-05-21

AUTHORS

Hongjun Wu , Bart Preneel

ABSTRACT

This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS-128 uses five AES round functions to process a 16-byte message block (one step); AES-256 uses six AES round functions. The security analysis shows that both algorithms offer a high level of security. On the Intel Sandy Bridge Core i5 processor, the speed of AEGIS is around 0.7 clock cycles/byte (cpb) for 4096-byte messages. This is comparable in speed to the CTR mode (that offers only encryption) and substantially faster than the CCM, GCM and OCB modes. More... »

PAGES

185-201

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10

DOI

http://dx.doi.org/10.1007/978-3-662-43414-7_10

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1032051449


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "School of Physical and Mathematical Sciences, Nanyang Technological University, Nanyang Link, Singapore", 
          "id": "http://www.grid.ac/institutes/grid.59025.3b", 
          "name": [
            "School of Physical and Mathematical Sciences, Nanyang Technological University, Nanyang Link, Singapore"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wu", 
        "givenName": "Hongjun", 
        "id": "sg:person.012702570012.45", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012702570012.45"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dept. Elektrotechniek-ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "Dept. Elektrotechniek-ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014-05-21", 
    "datePublishedReg": "2014-05-21", 
    "description": "This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS-128 uses five AES round functions to process a 16-byte message block (one step); AES-256 uses six AES round functions. The security analysis shows that both algorithms offer a high level of security. On the Intel Sandy Bridge Core i5 processor, the speed of AEGIS is around 0.7\u00a0clock cycles/byte (cpb) for 4096-byte messages. This is comparable in speed to the CTR mode (that offers only encryption) and substantially faster than the CCM, GCM and OCB modes.", 
    "editor": [
      {
        "familyName": "Lange", 
        "givenName": "Tanja", 
        "type": "Person"
      }, 
      {
        "familyName": "Lauter", 
        "givenName": "Kristin", 
        "type": "Person"
      }, 
      {
        "familyName": "Lison\u011bk", 
        "givenName": "Petr", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-662-43414-7_10", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-662-43413-0", 
        "978-3-662-43414-7"
      ], 
      "name": "Selected Areas in Cryptography -- SAC 2013", 
      "type": "Book"
    }, 
    "keywords": [
      "AES round function", 
      "Authenticated Encryption Algorithm", 
      "cycles/byte", 
      "round function", 
      "network packets", 
      "encryption algorithm", 
      "security analysis", 
      "CTR mode", 
      "i5 processor", 
      "AEGIS-128", 
      "AES-256", 
      "message blocks", 
      "OCB mode", 
      "algorithm", 
      "bytes", 
      "processors", 
      "security", 
      "packets", 
      "messages", 
      "speed", 
      "block", 
      "data", 
      "aegis", 
      "function", 
      "protection", 
      "mode", 
      "CCM", 
      "analysis", 
      "high levels", 
      "levels", 
      "GCM", 
      "paper"
    ], 
    "name": "AEGIS: A Fast Authenticated Encryption Algorithm", 
    "pagination": "185-201", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1032051449"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-43414-7_10"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-43414-7_10", 
      "https://app.dimensions.ai/details/publication/pub.1032051449"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:15", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_390.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-662-43414-7_10"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43414-7_10'


 

This table displays all metadata directly associated to this object as RDF triples.

111 TRIPLES      22 PREDICATES      56 URIs      49 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-43414-7_10 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nc29f3d0ccbd84f189d9cf7efbbc8713f
4 schema:datePublished 2014-05-21
5 schema:datePublishedReg 2014-05-21
6 schema:description This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS-128 uses five AES round functions to process a 16-byte message block (one step); AES-256 uses six AES round functions. The security analysis shows that both algorithms offer a high level of security. On the Intel Sandy Bridge Core i5 processor, the speed of AEGIS is around 0.7 clock cycles/byte (cpb) for 4096-byte messages. This is comparable in speed to the CTR mode (that offers only encryption) and substantially faster than the CCM, GCM and OCB modes.
7 schema:editor N3114dfebb3694faf9e3ab6f6f6db4bbd
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Nd927f81d88cd483c903912d184c78631
11 schema:keywords AEGIS-128
12 AES round function
13 AES-256
14 Authenticated Encryption Algorithm
15 CCM
16 CTR mode
17 GCM
18 OCB mode
19 aegis
20 algorithm
21 analysis
22 block
23 bytes
24 cycles/byte
25 data
26 encryption algorithm
27 function
28 high levels
29 i5 processor
30 levels
31 message blocks
32 messages
33 mode
34 network packets
35 packets
36 paper
37 processors
38 protection
39 round function
40 security
41 security analysis
42 speed
43 schema:name AEGIS: A Fast Authenticated Encryption Algorithm
44 schema:pagination 185-201
45 schema:productId N68e9aa2b24564f898430e6431cab606d
46 Nc0e27566247147bcaa3834b47018a57e
47 schema:publisher N96a6e9f931474ad08ee43f8465075f9c
48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032051449
49 https://doi.org/10.1007/978-3-662-43414-7_10
50 schema:sdDatePublished 2022-09-02T16:15
51 schema:sdLicense https://scigraph.springernature.com/explorer/license/
52 schema:sdPublisher Nbc66fa618881428fa08eb7d7c9b3b990
53 schema:url https://doi.org/10.1007/978-3-662-43414-7_10
54 sgo:license sg:explorer/license/
55 sgo:sdDataset chapters
56 rdf:type schema:Chapter
57 N13074de153e2440aa8de61f0b92bfe4b schema:familyName Lisoněk
58 schema:givenName Petr
59 rdf:type schema:Person
60 N1aafe8a42a2a4b82a41f8b76bd282146 rdf:first sg:person.011115044357.39
61 rdf:rest rdf:nil
62 N3114dfebb3694faf9e3ab6f6f6db4bbd rdf:first Na9444eaf6e70445b8edbc797732c7689
63 rdf:rest N7f034a935edb4f7196c5a21dbddb67c2
64 N66452fe0a35c415da90dc8b569c57f5f rdf:first N13074de153e2440aa8de61f0b92bfe4b
65 rdf:rest rdf:nil
66 N68e9aa2b24564f898430e6431cab606d schema:name dimensions_id
67 schema:value pub.1032051449
68 rdf:type schema:PropertyValue
69 N7f034a935edb4f7196c5a21dbddb67c2 rdf:first Na82787cf21144a25b454fe3f33b3c9aa
70 rdf:rest N66452fe0a35c415da90dc8b569c57f5f
71 N96a6e9f931474ad08ee43f8465075f9c schema:name Springer Nature
72 rdf:type schema:Organisation
73 Na82787cf21144a25b454fe3f33b3c9aa schema:familyName Lauter
74 schema:givenName Kristin
75 rdf:type schema:Person
76 Na9444eaf6e70445b8edbc797732c7689 schema:familyName Lange
77 schema:givenName Tanja
78 rdf:type schema:Person
79 Nbc66fa618881428fa08eb7d7c9b3b990 schema:name Springer Nature - SN SciGraph project
80 rdf:type schema:Organization
81 Nc0e27566247147bcaa3834b47018a57e schema:name doi
82 schema:value 10.1007/978-3-662-43414-7_10
83 rdf:type schema:PropertyValue
84 Nc29f3d0ccbd84f189d9cf7efbbc8713f rdf:first sg:person.012702570012.45
85 rdf:rest N1aafe8a42a2a4b82a41f8b76bd282146
86 Nd927f81d88cd483c903912d184c78631 schema:isbn 978-3-662-43413-0
87 978-3-662-43414-7
88 schema:name Selected Areas in Cryptography -- SAC 2013
89 rdf:type schema:Book
90 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
91 schema:name Information and Computing Sciences
92 rdf:type schema:DefinedTerm
93 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
94 schema:name Data Format
95 rdf:type schema:DefinedTerm
96 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
97 schema:familyName Preneel
98 schema:givenName Bart
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
100 rdf:type schema:Person
101 sg:person.012702570012.45 schema:affiliation grid-institutes:grid.59025.3b
102 schema:familyName Wu
103 schema:givenName Hongjun
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012702570012.45
105 rdf:type schema:Person
106 grid-institutes:grid.5596.f schema:alternateName Dept. Elektrotechniek-ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium
107 schema:name Dept. Elektrotechniek-ESAT/COSIC, KU Leuven and iMinds, Leuven, Belgium
108 rdf:type schema:Organization
109 grid-institutes:grid.59025.3b schema:alternateName School of Physical and Mathematical Sciences, Nanyang Technological University, Nanyang Link, Singapore
110 schema:name School of Physical and Mathematical Sciences, Nanyang Technological University, Nanyang Link, Singapore
111 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...