Review Article

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Table 2

Attacks of algorithms with confidentiality or integrity breach and adversaries knowledge.

AttacksTypeKnowledgeThreata
CIEODOKKMKCCMCC

IND-CPA×××××(a)
IND-CCA×××××(b)
NM-CPA×××××
INT-PTXT××××
INT-CTXT×××××
Fault××××××(a), (b)
Forgery×××××(c), (d)

a Threats are (a) recover the secret key, (b) recover the message, (c) manipulate packet header, (d) manipulate message.