2021
DOI: 10.46586/tosc.v2021.i2.1-30
|View full text |Cite
|
Sign up to set email alerts
|

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G

Abstract: In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements on the speed and security in 6G systems. To achieve ultra-fast software implementations, the basic design strategy is to take full advantage of the AES-NI and SIMD instructions as that of the AEGIS family and Tiaoxin-346. Although Jean and Nikolić have generalized the way to construct efficient round functions using only one round of AES (aesenc) and 128-bit XOR o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(23 citation statements)
references
References 6 publications
0
23
0
Order By: Relevance
“…In Sect.2, we describe AES-NI and the security evaluation against a forgery attack by internal collision which is used as the security criterion in this paper. We describe the design requirements of the round function of Jean and Nicolić [8] and Sakamoto et al [14], and the round function of Rocca is explained in Sect.3. We provide new representation of the round function of Rocca using matrices and present the new requirements in Sect.4.…”
Section: Organizationmentioning
confidence: 99%
See 4 more Smart Citations
“…In Sect.2, we describe AES-NI and the security evaluation against a forgery attack by internal collision which is used as the security criterion in this paper. We describe the design requirements of the round function of Jean and Nicolić [8] and Sakamoto et al [14], and the round function of Rocca is explained in Sect.3. We provide new representation of the round function of Rocca using matrices and present the new requirements in Sect.4.…”
Section: Organizationmentioning
confidence: 99%
“…1 The pipeline processing of AESENC on Intel Ice Lake. et al [14]. They searched for round functions that, when applied as a component in AEADs, guarantee 128-bit security against a forgery attack.…”
Section: Latency Cycles/bytementioning
confidence: 99%
See 3 more Smart Citations