Member-only story

Sign and Encrypt Strategies and Protocol in Data Authentication and Entity Authentication

Sign and Encrypt

Mi'kail Eli'yah
5 min readFeb 17, 2025

Naïve Sign & Encrypt appears in file-security and mail-security applications. Users need simple security semantics, and that symmetric-key semantics are sufficient for most users and most applications’ needs. symmetric-key semantics are easy for users to understand. Naïve Sign & Encrypt has different security semantics from symmetric encryption, but the difference is subtle, perhaps too subtle for non-specialist users and programmers to grasp.

Principle: Signs then performs authenticated encryption, hence, signs-then-encrypt-then-macs. If the MAC is good, then decrypt and verify the signature to verify who sent the message.

Repair Schemes For Sign-Then-Encrypt

Repair Options (to detect alterations)

5 independent and equivalently-secure ways to fix naïve Sign & Encrypt:

1. Sign recipient's name into plaintext, (r, msg)ˢ // prevent `surreptitious forwarding`2.Encrypt the sender's name into plaintext, (s, msg)ʳ // exclusion for recipient, however, sender's name w/o signature is flawed3.Incorporate both names;4.Sign again the signed-&-encrypted message; // S/E/S5.Encrypt again the signed ciphertext. // E/S/E

--

--

Mi'kail Eli'yah
Mi'kail Eli'yah

No responses yet