Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Published: |
Institute of Electrical and Electronics Engineers
2022
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/33556/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.33556 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.335562022-07-27T07:11:40Z http://eprints.um.edu.my/33556/ Authenticated encryption schemes: A systematic review Jimale, Mohamud Ahmed Z'aba, Muhammad Reza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Jamil, Norziana Mohamad, Moesfa Soeheila Rohmad, Mohd Saufy QA75 Electronic computers. Computer science TA Engineering (General). Civil engineering (General) Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features. Institute of Electrical and Electronics Engineers 2022 Article PeerReviewed Jimale, Mohamud Ahmed and Z'aba, Muhammad Reza and Kiah, Miss Laiha Binti Mat and Idris, Mohd Yamani Idna and Jamil, Norziana and Mohamad, Moesfa Soeheila and Rohmad, Mohd Saufy (2022) Authenticated encryption schemes: A systematic review. IEEE Access, 10. pp. 14739-14766. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2022.3147201 <https://doi.org/10.1109/ACCESS.2022.3147201>. 10.1109/ACCESS.2022.3147201 |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
topic |
QA75 Electronic computers. Computer science TA Engineering (General). Civil engineering (General) |
spellingShingle |
QA75 Electronic computers. Computer science TA Engineering (General). Civil engineering (General) Jimale, Mohamud Ahmed Z'aba, Muhammad Reza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Jamil, Norziana Mohamad, Moesfa Soeheila Rohmad, Mohd Saufy Authenticated encryption schemes: A systematic review |
description |
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features. |
format |
Article |
author |
Jimale, Mohamud Ahmed Z'aba, Muhammad Reza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Jamil, Norziana Mohamad, Moesfa Soeheila Rohmad, Mohd Saufy |
author_facet |
Jimale, Mohamud Ahmed Z'aba, Muhammad Reza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Jamil, Norziana Mohamad, Moesfa Soeheila Rohmad, Mohd Saufy |
author_sort |
Jimale, Mohamud Ahmed |
title |
Authenticated encryption schemes: A systematic review |
title_short |
Authenticated encryption schemes: A systematic review |
title_full |
Authenticated encryption schemes: A systematic review |
title_fullStr |
Authenticated encryption schemes: A systematic review |
title_full_unstemmed |
Authenticated encryption schemes: A systematic review |
title_sort |
authenticated encryption schemes: a systematic review |
publisher |
Institute of Electrical and Electronics Engineers |
publishDate |
2022 |
url |
http://eprints.um.edu.my/33556/ |
_version_ |
1739828456471920640 |
score |
13.211869 |