Authenticated Encryption Schemes: A Systematic Review

  • Mohamud Ahmed Jimale
  • , Muhammad Reza Z'Aba
  • , Miss Laiha Binti Mat Kiah
  • , Mohd Yamani Idna Idris
  • , Norziana Jamil
  • , Moesfa Soeheila Mohamad
  • , Mohd Saufy Rohmad

Research output: Contribution to journalReview articlepeer-review

Abstract

Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features.

Original languageEnglish
Pages (from-to)14739-14766
Number of pages28
JournalIEEE Access
Volume10
DOIs
Publication statusPublished - 2022
Externally publishedYes

Keywords

  • Authenticated encryption
  • CAESAR competition
  • NIST-LW competition
  • confidentiality
  • integrity
  • message authentication code

ASJC Scopus subject areas

  • General Computer Science
  • General Materials Science
  • General Engineering

Fingerprint

Dive into the research topics of 'Authenticated Encryption Schemes: A Systematic Review'. Together they form a unique fingerprint.

Cite this