Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

被引:60
|
作者
Peyrin, Thomas [1 ]
Seurin, Yannick [2 ]
机构
[1] Nanyang Technol Univ, SPMS, Singapore, Singapore
[2] ANSSI, Paris, France
基金
新加坡国家研究基金会;
关键词
Authenticated encryption; Tweakable block cipher; Nonce-misuse resistance; Beyond-birthday-bound security; CAESAR competition; SECURITY TREATMENT; BLOCKCIPHERS; PERFORMANCE; OPERATION; NOTIONS;
D O I
10.1007/978-3-662-53018-4_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a nonce-based authenticated encryption scheme (with associated data). The SCT mode combines in a SIV-like manner a Wegman-Carter MAC inspired from PMAC for the authentication part and a new counter-like mode for the encryption part, with the unusual property that the counter is applied on the tweak input of the underlying tweakable block cipher rather than on the plaintext input. Unlike many previous authenticated encryption modes, SCT enjoys provable security beyond the birthday bound (and even up to roughly 2 n tweakable block cipher calls, where n is the block length, when the tweak length is sufficiently large) in the nonce-respecting scenario where nonces are never repeated. In addition, SCT ensures security up to the birthday bound even when nonces are reused, in the strong nonce-misuse resistance sense (MRAE) of Rogaway and Shrimpton (EUROCRYPT 2006). To the best of our knowledge, this is the first authenticated encryption mode that provides at the same time close-tooptimal security in the nonce-respecting scenario and birthday-bound security for the nonce-misuse scenario. While two passes are necessary to achieve MRAE-security, our mode enjoys a number of desirable features: it is simple, parallelizable, it requires the encryption direction only, it is particularly efficient for small messages compared to other noncemisuse resistant schemes (no precomputation is required) and it allows incremental update of associated data.
引用
收藏
页码:33 / 63
页数:31
相关论文
共 50 条
  • [41] On the Security of Sponge-type Authenticated Encryption Modes
    Chakraborty, Bishwajit
    Jha, Ashwin
    Nandi, Mridul
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 93 - 119
  • [42] Encryption performance and security of certain wide block ciphers
    Vladimir Fomichev
    Alisa Koreneva
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 197 - 216
  • [43] Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function
    Bossert, Jannis
    List, Eik
    Lucks, Stefan
    Schmitz, Sebastian
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 511 - 536
  • [44] Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches
    Bhattacharjee, Arghya
    Bhaumik, Ritam
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 171 - 194
  • [45] Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
    Khairallah, Mustafa
    Chattopadhyay, Anupam
    Peyrin, Thomas
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2017, 2017, 10698 : 282 - 301
  • [46] Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata
    Ray, Abhishek
    Das, Debasis
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 269 - 275
  • [47] Detection of Stegosystems Using Block Ciphers for Encryption of the Embedded Messages
    Korzhik, Valery
    Fedyanin, Ivan
    Nguyen Duy Cuong
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 181 - 186
  • [48] Chaos and cryptography: Block encryption ciphers based on chaotic maps
    Jakimoski, G
    Kocarev, L
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (02) : 163 - 169
  • [49] Identification of Encryption Method for Block Ciphers using Histogram Method
    Nagireddy, Sreenivasulu
    Murthy, Hema A.
    Kant, Shri
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (04): : 319 - 328
  • [50] RACE: Randomized Counter Mode of Authenticated Encryption using Cellular Automata
    Banerjee, Tapadyoti
    Das, Bijoy
    Mehta, Deval
    Chowdhury, Dipanwita Roy
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 504 - 509