Revisiting the Security of COMET Authenticated Encryption Scheme

被引:0
|
作者
Gueron, Shay [1 ,2 ]
Jha, Ashwin [3 ]
Nandi, Mridul [4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Amazon Web Serv, Seattle, WA USA
[3] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[4] Indian Stat Inst, Kolkata, India
来源
基金
以色列科学基金会;
关键词
COMET; ICM; Provable security; Rekeying; Lightweight; AEAD;
D O I
10.1007/978-3-030-92518-5_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
COMETv1, by Gueron, Jha and Nandi, is a mode of operation for nonce-based authenticated encryption with associated data functionality. It was one of the second round candidates in the ongoing NIST Lightweight Cryptography Standardization Process. In this paper, we study a generalized version of COMETv1, that we call gCOMET, from provable security perspective. First, we present a comprehensive and complete security proof for gCOMET in the ideal cipher model. Second, we view COMET, the underlying mode of operation in COMETv1, as an instantiation of gCOMET, and derive its concrete security bounds. Finally, we propose another instantiation of gCOMET, dubbed COMETv2, and show that this version achieves better security guarantees as well as memory-efficient implementations as compared to COMETv1.
引用
收藏
页码:3 / 25
页数:23
相关论文
共 50 条
  • [1] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [2] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [3] Comments on the security of Chen's authenticated encryption scheme
    Rasslan, Mohamed
    Youssef, Amr
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (01) : 71 - 74
  • [4] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [5] A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security
    Peng, Zhiniang
    Tang, Shaohua
    Jiang, Linzhi
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 86 - 99
  • [6] Authenticated encryption scheme with (t,n) shared verification and its security
    Lu, J.Z.
    Chen, H.Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2001, 38 (09):
  • [7] ZLR: a fast online authenticated encryption scheme achieving full security
    Choi, Wonseok
    Hwang, Seongha
    Lee, Byeonghak
    Lee, Jooyoung
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (10) : 3261 - 3316
  • [8] On the security of a convertible authenticated encryption
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1063 - 1069
  • [9] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [10] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209