Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

被引:60
|
作者
Peyrin, Thomas [1 ]
Seurin, Yannick [2 ]
机构
[1] Nanyang Technol Univ, SPMS, Singapore, Singapore
[2] ANSSI, Paris, France
基金
新加坡国家研究基金会;
关键词
Authenticated encryption; Tweakable block cipher; Nonce-misuse resistance; Beyond-birthday-bound security; CAESAR competition; SECURITY TREATMENT; BLOCKCIPHERS; PERFORMANCE; OPERATION; NOTIONS;
D O I
10.1007/978-3-662-53018-4_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a nonce-based authenticated encryption scheme (with associated data). The SCT mode combines in a SIV-like manner a Wegman-Carter MAC inspired from PMAC for the authentication part and a new counter-like mode for the encryption part, with the unusual property that the counter is applied on the tweak input of the underlying tweakable block cipher rather than on the plaintext input. Unlike many previous authenticated encryption modes, SCT enjoys provable security beyond the birthday bound (and even up to roughly 2 n tweakable block cipher calls, where n is the block length, when the tweak length is sufficiently large) in the nonce-respecting scenario where nonces are never repeated. In addition, SCT ensures security up to the birthday bound even when nonces are reused, in the strong nonce-misuse resistance sense (MRAE) of Rogaway and Shrimpton (EUROCRYPT 2006). To the best of our knowledge, this is the first authenticated encryption mode that provides at the same time close-tooptimal security in the nonce-respecting scenario and birthday-bound security for the nonce-misuse scenario. While two passes are necessary to achieve MRAE-security, our mode enjoys a number of desirable features: it is simple, parallelizable, it requires the encryption direction only, it is particularly efficient for small messages compared to other noncemisuse resistant schemes (no precomputation is required) and it allows incremental update of associated data.
引用
收藏
页码:33 / 63
页数:31
相关论文
共 50 条
  • [21] Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher
    Bellizia, Davide
    Berti, Francesco
    Bronchain, Olivier
    Cassiers, Gaetan
    Duval, Sebastien
    Guo, Chun
    Leander, Gregor
    Leurent, Gaetan
    Levi, Itamar
    Momin, Charles
    Pereira, Olivier
    Peters, Thomas
    Standaert, Francois-Xavier
    Udvarhelyi, Balazs
    Wiemer, Friedrich
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 295 - 349
  • [22] Integrity analysis of authenticated encryption based on stream ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) : 493 - 511
  • [23] Integrity analysis of authenticated encryption based on stream ciphers
    Kazuya Imamura
    Kazuhiko Minematsu
    Tetsu Iwata
    International Journal of Information Security, 2018, 17 : 493 - 511
  • [24] Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher
    Hasan, Munawar
    Chang, Donghoon
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14357 - 14369
  • [25] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 257 - 276
  • [26] Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
    He, Yu
    Wang, Gaoli
    Li, Wenshan
    Ren, Yizhi
    IEEE ACCESS, 2020, 8 : 20920 - 20930
  • [27] Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
    Ankele, Ralph
    Dobraunig, Christoph
    Guo, Jian
    Lambooij, Eran
    Leander, Gregor
    Todo, Yosuke
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (01) : 192 - 235
  • [28] On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
    Jha, Ashwin
    Nandi, Mridul
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 731 - 753
  • [29] Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks
    Cogliati, Benoit
    Dodis, Yevgeniy
    Katz, Jonathan
    Lee, Jooyoung
    Steinberger, John
    Thiruvengadam, Aishwarya
    Zhang, Zhe
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 722 - 753
  • [30] On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
    Ashwin Jha
    Mridul Nandi
    Cryptography and Communications, 2018, 10 : 731 - 753