**Authenticated Encryption (AE)** is a block cipher mode of operation which simultaneously provides confidentiality, integrity and authenticity assurances on the data. It became readily apparent that securely compositing a confidentiality mode with an authentication mode could be error prone and difficult. As Bellare, Rogaway, and Wagner wrote in *A Conventional Authenticated-Encryption Mode*:

...people had been doing rather poorly when they tried to glue together a traditional (privacy-only) encryption scheme and a message authentication code (MAC).

And in *The CWC Authenticated Encryption (Associated Data) Mode*, Kohno, Whiting, and Viega write:

...it is very easy to accidentally combine secure encryption schemes with secure MACs and still get insecure authenticated encryption schemes.

In addition to protecting message integrity and confidentiality, authenticated encryption can provide plaintext awareness and security against chosen ciphertext attack. In these attacks, an adversary attempts to gain an advantage against a cryptosystem (e.g., information about the secret decryption key) by submitting carefully chosen ciphertexts to some "decryption oracle" and analyzing the decrypted results. Authenticated encryption schemes can recognize improperly-constructed ciphertexts and refuse to decrypt them. This in turn prevents the attacker from requesting the decryption of any ciphertext unless he generated it correctly using the encryption algorithm, which would imply that he already knows the plaintext. Implemented correctly, this removes the usefulness of the decryption oracle, by preventing an attacker from gaining useful information that he does not already possess.

Many specialized authenticated encryption modes have been developed for use with symmetric block ciphers. However, authenticated encryption can be generically constructed by combining an encryption scheme and a Message Authentication Code (MAC), provided that the encryption scheme is semantically secure under chosen plaintext attack and the MAC function is unforgeable under chosen message attack. Bellare and Namprempre (2000) analyzed three compositions of these primitives, and demonstrated that encrypting a message and subsequently applying a MAC to the ciphertext implies security against adaptive chosen ciphertext attack, provided that both functions meet the required properties.

Six different authenticated encryption modes, namely OCB 2.0, Key Wrap, CCM, EAX, Encrypt-then-MAC and GCM, have been standardized in ISO/IEC 19772:2009 (Authenticated encryption).

### Other articles related to "authenticated encryption, authenticated, encryption":

**Authenticated Encryption**

...

**Authenticated encryption**modes are classified as single pass modes or double pass modes ... the cryptographic user community, many of the single pass

**authenticated encryption**algorithms (such as OCB mode) are patent encumbered ... allow for the authentication of unencrypted associated data, and these are called AEAD (

**Authenticated**-Encryption with Associated-Data) schemes ...

... categorize as confidentiality, authenticity, or

**authenticated encryption**- for example Key Feedback Mode (KFM) and AES-hash ... Disk

**encryption**often uses special purpose modes specifically designed for the application ... Tweakable narrow-block

**encryption**modes (LRW, XEX, and XTS) and wide-block

**encryption**modes (CMC and EME) are designed to securely encrypt sectors of a ...