Authenticated encryption schemes: A systematic review

Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes...

Full description

Saved in:
Bibliographic Details
Main Authors: Jimale, Mohamud Ahmed, Z'aba, Muhammad Reza, Kiah, Miss Laiha Binti Mat, Idris, Mohd Yamani Idna, Jamil, Norziana, Mohamad, Moesfa Soeheila, Rohmad, Mohd Saufy
Format: Article
Published: Institute of Electrical and Electronics Engineers 2022
Subjects:
Online Access:http://eprints.um.edu.my/33556/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.33556
record_format eprints
spelling my.um.eprints.335562022-07-27T07:11:40Z http://eprints.um.edu.my/33556/ Authenticated encryption schemes: A systematic review Jimale, Mohamud Ahmed Z'aba, Muhammad Reza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Jamil, Norziana Mohamad, Moesfa Soeheila Rohmad, Mohd Saufy QA75 Electronic computers. Computer science TA Engineering (General). Civil engineering (General) Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features. Institute of Electrical and Electronics Engineers 2022 Article PeerReviewed Jimale, Mohamud Ahmed and Z'aba, Muhammad Reza and Kiah, Miss Laiha Binti Mat and Idris, Mohd Yamani Idna and Jamil, Norziana and Mohamad, Moesfa Soeheila and Rohmad, Mohd Saufy (2022) Authenticated encryption schemes: A systematic review. IEEE Access, 10. pp. 14739-14766. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2022.3147201 <https://doi.org/10.1109/ACCESS.2022.3147201>. 10.1109/ACCESS.2022.3147201
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
topic QA75 Electronic computers. Computer science
TA Engineering (General). Civil engineering (General)
spellingShingle QA75 Electronic computers. Computer science
TA Engineering (General). Civil engineering (General)
Jimale, Mohamud Ahmed
Z'aba, Muhammad Reza
Kiah, Miss Laiha Binti Mat
Idris, Mohd Yamani Idna
Jamil, Norziana
Mohamad, Moesfa Soeheila
Rohmad, Mohd Saufy
Authenticated encryption schemes: A systematic review
description Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features.
format Article
author Jimale, Mohamud Ahmed
Z'aba, Muhammad Reza
Kiah, Miss Laiha Binti Mat
Idris, Mohd Yamani Idna
Jamil, Norziana
Mohamad, Moesfa Soeheila
Rohmad, Mohd Saufy
author_facet Jimale, Mohamud Ahmed
Z'aba, Muhammad Reza
Kiah, Miss Laiha Binti Mat
Idris, Mohd Yamani Idna
Jamil, Norziana
Mohamad, Moesfa Soeheila
Rohmad, Mohd Saufy
author_sort Jimale, Mohamud Ahmed
title Authenticated encryption schemes: A systematic review
title_short Authenticated encryption schemes: A systematic review
title_full Authenticated encryption schemes: A systematic review
title_fullStr Authenticated encryption schemes: A systematic review
title_full_unstemmed Authenticated encryption schemes: A systematic review
title_sort authenticated encryption schemes: a systematic review
publisher Institute of Electrical and Electronics Engineers
publishDate 2022
url http://eprints.um.edu.my/33556/
_version_ 1739828456471920640
score 13.211869