Authenticated Encryption Schemes: A Systematic Review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes...
Published in: | IEEE Access |
---|---|
Main Author: | |
Format: | Review |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2022
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124069455&doi=10.1109%2fACCESS.2022.3147201&partnerID=40&md5=8abd65288ce644a8a55ab8d2e49c7fd8 |
id |
2-s2.0-85124069455 |
---|---|
spelling |
2-s2.0-85124069455 Jimale M.A.; Z'Aba M.R.; Kiah M.L.B.M.; Idris M.Y.I.; Jamil N.; Mohamad M.S.; Rohmad M.S. Authenticated Encryption Schemes: A Systematic Review 2022 IEEE Access 10 10.1109/ACCESS.2022.3147201 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124069455&doi=10.1109%2fACCESS.2022.3147201&partnerID=40&md5=8abd65288ce644a8a55ab8d2e49c7fd8 Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features. © 2013 IEEE. Institute of Electrical and Electronics Engineers Inc. 21693536 English Review All Open Access; Gold Open Access |
author |
Jimale M.A.; Z'Aba M.R.; Kiah M.L.B.M.; Idris M.Y.I.; Jamil N.; Mohamad M.S.; Rohmad M.S. |
spellingShingle |
Jimale M.A.; Z'Aba M.R.; Kiah M.L.B.M.; Idris M.Y.I.; Jamil N.; Mohamad M.S.; Rohmad M.S. Authenticated Encryption Schemes: A Systematic Review |
author_facet |
Jimale M.A.; Z'Aba M.R.; Kiah M.L.B.M.; Idris M.Y.I.; Jamil N.; Mohamad M.S.; Rohmad M.S. |
author_sort |
Jimale M.A.; Z'Aba M.R.; Kiah M.L.B.M.; Idris M.Y.I.; Jamil N.; Mohamad M.S.; Rohmad M.S. |
title |
Authenticated Encryption Schemes: A Systematic Review |
title_short |
Authenticated Encryption Schemes: A Systematic Review |
title_full |
Authenticated Encryption Schemes: A Systematic Review |
title_fullStr |
Authenticated Encryption Schemes: A Systematic Review |
title_full_unstemmed |
Authenticated Encryption Schemes: A Systematic Review |
title_sort |
Authenticated Encryption Schemes: A Systematic Review |
publishDate |
2022 |
container_title |
IEEE Access |
container_volume |
10 |
container_issue |
|
doi_str_mv |
10.1109/ACCESS.2022.3147201 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124069455&doi=10.1109%2fACCESS.2022.3147201&partnerID=40&md5=8abd65288ce644a8a55ab8d2e49c7fd8 |
description |
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features. © 2013 IEEE. |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
issn |
21693536 |
language |
English |
format |
Review |
accesstype |
All Open Access; Gold Open Access |
record_format |
scopus |
collection |
Scopus |
_version_ |
1809678026429956096 |