Ensuring confidentiality and integrity of communication remains among the most important goals of cryptography. The notion of authenticated encryption marries these two security goals in a single symmetric-key, cryptographic primitive. A lot of effort has been invested in authenticated encryption during the fifteen years of its existence. The recent Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) has boosted the research activity in this area even more. As a result, the area of authenticated encryption boasts numerous results, both theoretically and practically oriented, and perhaps, even greater number of constructions of authenticated encryption schemes.We explore the current landscape of results on authenticated encryption. We review the CEASAR competition and its candidates, the most popular construction principles, and various design goals for authenticated encryption, many of which appeared during the CAESAR competition. We also take a closer look at the candidate Offset Merkle-Damg\r{a}rd (OMD).
@article{451, title = {The State of the Authenticated Encryption}, journal = {Tatra Mountains Mathematical Publications}, volume = {65}, year = {2016}, doi = {10.2478/tatra.v67i0.451}, language = {EN}, url = {http://dml.mathdoc.fr/item/451} }
Vizár, Damian. The State of the Authenticated Encryption. Tatra Mountains Mathematical Publications, Tome 65 (2016) . doi : 10.2478/tatra.v67i0.451. http://gdmltest.u-ga.fr/item/451/