Authenticated encryption with associated data Authenticated encryption with associated data (AEAD) is a variant of AE that allows the message to include "associated data" (AD, additional non-confidential information, a.k.a. "additional authenticated data", AAD). A recipient can check the integrity of both the associated data and the confidential information in a message. AD is useful, for example, in
network packets where the
header should be visible for
routing, but the payload needs to be confidential, and both need
integrity and
authenticity. The notion of AEAD was formalized by
Rogaway (2002).
Key-committing AEAD AE was originally designed primarily to provide the ciphertext integrity: successful validation of an authentication tag by
Alice using her symmetric key KA indicates that the message was not tampered with by an adversary
Mallory that does not possess the KA. The AE schemes usually do not provide the
key commitment, a guarantee that the decryption would fail for any other key. As of 2021, most existing AE schemes (including the very popular GCM) allow some messages to be decrypted without an error using more than just the (correct) KA; while the plaintext decrypted using a second (wrong) key KM will be incorrect, the authentication tag would still match the new plaintext. Since crafting a message with such property requires Mallory to already possess both KA and KM, the issue might appear to be one of a purely academic interest. However, under special circumstances, practical attacks can be mounted against vulnerable implementations. For example, if an identity authentication protocol is based on successful decryption of a message that uses a password-based key, Mallory's ability to craft a single message that would be successfully decrypted using 1000 different keys associated with
weak, and thus known to her, potential passwords, can speed up her search for passwords by a factor of almost 1000. For this
dictionary attack to succeed, Mallory also needs an ability to distinguish successful decryption by Alice from an unsuccessful one, due, for example, to a poor protocol design or implementation turning Alice's side into an
oracle. Naturally, this attack cannot be mounted at all when the keys are generated randomly. Key commitment was originally studied in the 2010s by Abdalla et al. and Farshim et al. under the name "robust encryption". To mitigate the attack described above without removing the "oracle", a
key-committing AEAD that does not allow this type of crafted messages to exist can be used. AEGIS is an example of fast (if the
AES instruction set is present), key-committing AEAD. It is possible to add key-commitment to an existing AEAD scheme.
Misuse-resistant authenticated encryption Misuse-resistant authenticated encryption (MRAE) has the additional property that reusing the same
nonce for several messages does not allow an attacker to recover the plaintext. MRAE was formalized in 2006 by
Phillip Rogaway and Thomas Shrimpton. One example of a MRAE algorithm is
AES-GCM-SIV. ==Approaches to authenticated encryption==