Skip to content

Instantly share code, notes, and snippets.

@zackw
Created November 15, 2013 00:09
Show Gist options
  • Save zackw/7476786 to your computer and use it in GitHub Desktop.
Save zackw/7476786 to your computer and use it in GitHub Desktop.
Authenticated encryption mode cheatsheet, aka figure 2 from Bellare and Namprempre 2000.
% This is a visually redesigned version of a table from “Authenticated
% encryption: Relations among notions and analysis of the generic
% composition paradigm.” by Mihir Bellare and Chanathip Namprempre
% (ASIACRYPT 2000). The content is entirely theirs.
% I (Zachary Weinberg) disclaim any copyright interest I might have in
% this redesigned version.
\documentclass[10pt]{article}
\usepackage[letterpaper,margin=0.5in]{geometry}
\usepackage{microtype}
\usepackage{pxfonts}
\usepackage{pifont}
\usepackage{booktabs}
\usepackage{multirow}
\usepackage{url}
\newcommand{\Y}{\ding{52}}% check mark
\newcommand{\N}{\ding{53}}% thin X
\begin{document}
\thispagestyle{empty}
\begin{flushleft}%
\begin{tabular}{ll@{\hskip 18pt}ccc@{\hskip 18pt}cc}
& &
\multicolumn{3}{c}{\textbf{Privacy}}&
\multicolumn{2}{c}{\textbf{Integrity}} \\
\multicolumn{2}{c}{\textbf{Composition Method}}&
IND-CPA & IND-CCA & NM-CPA & INT-PTXT & INT-CTXT \\
\midrule
\multirow{3}{*}{\textbf{weak MAC}}
& Encrypt-and-MAC & \N & \N & \N & \Y & \N \\
& MAC-then-encrypt & \Y & \N & \N & \Y & \N \\
& Encrypt-then-MAC & \Y & \N & \N & \Y & \N \\
\cmidrule{3-7}
\multirow{3}{*}{\textbf{strong MAC}}
& Encrypt-and-MAC & \N & \N & \N & \Y & \N \\
& MAC-then-encrypt & \Y & \N & \N & \Y & \N \\
& Encrypt-then-MAC & \Y & \Y & \Y & \Y & \Y \\
\end{tabular}\\[2ex]
\footnotesize{after Bellare and Namprempre (2000)
\url{http://www.cs.ucsd.edu/~mihir/papers/oem.ps.gz}}%
\end{flushleft}
\end{document}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment