Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

被引:60
|
作者
Peyrin, Thomas [1 ]
Seurin, Yannick [2 ]
机构
[1] Nanyang Technol Univ, SPMS, Singapore, Singapore
[2] ANSSI, Paris, France
基金
新加坡国家研究基金会;
关键词
Authenticated encryption; Tweakable block cipher; Nonce-misuse resistance; Beyond-birthday-bound security; CAESAR competition; SECURITY TREATMENT; BLOCKCIPHERS; PERFORMANCE; OPERATION; NOTIONS;
D O I
10.1007/978-3-662-53018-4_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a nonce-based authenticated encryption scheme (with associated data). The SCT mode combines in a SIV-like manner a Wegman-Carter MAC inspired from PMAC for the authentication part and a new counter-like mode for the encryption part, with the unusual property that the counter is applied on the tweak input of the underlying tweakable block cipher rather than on the plaintext input. Unlike many previous authenticated encryption modes, SCT enjoys provable security beyond the birthday bound (and even up to roughly 2 n tweakable block cipher calls, where n is the block length, when the tweak length is sufficiently large) in the nonce-respecting scenario where nonces are never repeated. In addition, SCT ensures security up to the birthday bound even when nonces are reused, in the strong nonce-misuse resistance sense (MRAE) of Rogaway and Shrimpton (EUROCRYPT 2006). To the best of our knowledge, this is the first authenticated encryption mode that provides at the same time close-tooptimal security in the nonce-respecting scenario and birthday-bound security for the nonce-misuse scenario. While two passes are necessary to achieve MRAE-security, our mode enjoys a number of desirable features: it is simple, parallelizable, it requires the encryption direction only, it is particularly efficient for small messages compared to other noncemisuse resistant schemes (no precomputation is required) and it allows incremental update of associated data.
引用
收藏
页码:33 / 63
页数:31
相关论文
共 50 条
  • [31] Stream vs block ciphers for scan encryption
    Valea, Emanuele
    Da Silva, Mathieu
    Flottes, Marie-Lise
    Di Natale, Giorgio
    Rouzeyre, Bruno
    MICROELECTRONICS JOURNAL, 2019, 86 : 65 - 76
  • [32] Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
    Cogliati, Benoit
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 134 - 158
  • [33] Fault attacks on authenticated encryption modes for GIFT
    Liu, Shuai
    Guan, Jie
    Hu, Bin
    IET INFORMATION SECURITY, 2022, 16 (01) : 51 - 63
  • [34] The Software Performance of Authenticated-Encryption Modes
    Krovetz, Ted
    Rogaway, Phillip
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 306 - 327
  • [35] Key-joined block ciphers with input-output pseudorandom shuffling applied to remotely keyed authenticated encryption
    Hasan, Yassin M. Y.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, 2007, : 283 - 288
  • [36] Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers
    Abbas, Amr
    Mostafa, Hassan
    Mohieldin, Ahmed Nader
    JOURNAL OF LOW POWER ELECTRONICS, 2019, 15 (01) : 104 - 114
  • [37] Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers
    Choi, Wonseok
    Inoue, Akiko
    Lee, Byeonghak
    Lee, Jooyoung
    List, Eik
    Minematsu, Kazuhiko
    Naito, Yusuke
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (04) : 39 - 70
  • [38] Accelerated Software Implementation of Authenticated Encryption Stream Ciphers for High Speed Applications
    Taha, Sara
    Mostafa, Hassan
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 27 - 31
  • [39] Tweakable enciphering schemes using only the encryption function of a block cipher
    Sarkar, Palash
    INFORMATION PROCESSING LETTERS, 2011, 111 (19) : 945 - 955
  • [40] Encryption performance and security of certain wide block ciphers
    Fomichev, Vladimir
    Koreneva, Alisa
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (03) : 197 - 216