Abstract

In the race of designing an efficient ‘Authenticated Encryption (AE) mode of operation’ several efforts have been done over past few years. In practical, when we have to send any data, we also need integrity and authentication along with the encrypted message. These requirements in real world prioritize Authenticated Encryption, in spite of using encryption and authentication schemes separately. In an AE scheme the parts responsible for authentication and privacy are tightly coupled so that they can work efficiently. The other reason for using AE scheme is that an AE scheme is less likely to be used incorrectly than the combination of two different schemes. In this paper comparative study of two prominent Authenticated Encryption modes (RKC and GCM) is done that are free from any intellectual property claims. General Terms Security, Authenticated Encryption modes.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call