Authenticated Encryption with Variable Stretch

被引:12
|
作者
Reyhanitabar, Reza [1 ]
Vaudenay, Serge [2 ]
Vizar, Damian [2 ]
机构
[1] NEC Labs Europe, Heidelberg, Germany
[2] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
关键词
Authenticated encryption; Variable length tags; Robustness; Security definitions; CAESAR competition;
D O I
10.1007/978-3-662-53887-6_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In conventional authenticated-encryption (AE) schemes, the ciphertext expansion, a.k.a. stretch or tag length, is a constant or a parameter of the scheme that must be fixed per key. However, using variable-length tags per key can be desirable in practice or may occur as a result of a misuse. The RAE definition by Hoang, Krovetz, and Rogaway (Eurocrypt 2015), aiming at the best-possible AE security, supports variable stretch among other strong features, but achieving the RAE goal incurs a particular inefficiency: neither encryption nor decryption can be online. The problem of enhancing the well-established nonce-based AE (nAE) model and the standard schemes thereof to support variable tag lengths per key, without sacrificing any desirable functional and efficiency properties such as online encryption, has recently regained interest as evidenced by extensive discussion threads on the CFRG forum and the CAESAR competition. Yet there is a lack of formal definition for this goal. First, we show that several recently proposed heuristic measures trying to augment the known schemes by inserting the tag length into the nonce and/or associated data fail to deliver any meaningful security in this setting. Second, we provide a formal definition for the notion of nonce-based variable-stretch AE (nvAE) as a natural extension to the traditional nAE model. Then, we proceed by showing a second modular approach to formalizing the goal by combining the nAE notion and a new property we call key-equivalent separation by stretch (kess). It is proved that (after a mild adjustment to the syntax) any nAE scheme which additionally fulfills the kess property will achieve the nvAE goal. Finally, we show that the nvAE goal is efficiently and provably achievable; for instance, by simple tweaks to off-the-shelf schemes such as OCB.
引用
收藏
页码:396 / 425
页数:30
相关论文
共 50 条
  • [21] An Improved Authenticated Encryption Scheme
    Li, Fagen
    Deng, Jiang
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2171 - 2172
  • [22] Cryptanalysis of the EPBC authenticated encryption mode
    Mitchell, Chris J.
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2007, 4887 : 118 - +
  • [23] Research on the Authenticated Encryption Technology in CCSDS
    Gong Chang-Qing
    Yang Ya-Hui
    APPLIED INFORMATICS AND COMMUNICATION, PT I, 2011, 224 : 321 - 329
  • [24] Disk-Enabled Authenticated Encryption
    Butler, Kevin
    McLaughlin, Stephen
    McDaniel, Patrick
    2010 IEEE 26TH SYMPOSIUM ON MASS STORAGE SYSTEMS AND TECHNOLOGIES (MSST), 2010,
  • [25] Authenticated encryption schemes with message linkage
    Hwang, SJ
    Chang, CC
    Yang, WP
    INFORMATION PROCESSING LETTERS, 1996, 58 (04) : 189 - 194
  • [26] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185
  • [27] Password-authenticated searchable encryption
    Chen, Liqun
    Huang, Kaibin
    Manulis, Mark
    Sekar, Venkkatesh
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (05) : 675 - 693
  • [28] Password-authenticated searchable encryption
    Liqun Chen
    Kaibin Huang
    Mark Manulis
    Venkkatesh Sekar
    International Journal of Information Security, 2021, 20 : 675 - 693
  • [29] Hardware Trojan for an Authenticated Encryption Minalpher
    Nozaki, Yusuke
    Ikezaki, Yoshiya
    Yoshikawa, Masaya
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [30] CLOC: Authenticated Encryption for Short Input
    Iwata, Tetsu
    Minematsu, Kazuhiko
    Guo, Jian
    Morioka, Sumio
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 149 - 167