Revisiting the Security of COMET Authenticated Encryption Scheme

被引:0
|
作者
Gueron, Shay [1 ,2 ]
Jha, Ashwin [3 ]
Nandi, Mridul [4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Amazon Web Serv, Seattle, WA USA
[3] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[4] Indian Stat Inst, Kolkata, India
来源
基金
以色列科学基金会;
关键词
COMET; ICM; Provable security; Rekeying; Lightweight; AEAD;
D O I
10.1007/978-3-030-92518-5_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
COMETv1, by Gueron, Jha and Nandi, is a mode of operation for nonce-based authenticated encryption with associated data functionality. It was one of the second round candidates in the ongoing NIST Lightweight Cryptography Standardization Process. In this paper, we study a generalized version of COMETv1, that we call gCOMET, from provable security perspective. First, we present a comprehensive and complete security proof for gCOMET in the ideal cipher model. Second, we view COMET, the underlying mode of operation in COMETv1, as an instantiation of gCOMET, and derive its concrete security bounds. Finally, we propose another instantiation of gCOMET, dubbed COMETv2, and show that this version achieves better security guarantees as well as memory-efficient implementations as compared to COMETv1.
引用
收藏
页码:3 / 25
页数:23
相关论文
共 50 条
  • [41] Security notes on generalization of threshold signature and authenticated encryption
    Wang, Shuhong
    Wang, Guilin
    Bao, Feng
    Wang, Jie
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2004, E87-A (12) : 3443 - 3446
  • [42] Authenticated encryption mode for beyond the birthday bound security
    Iwata, Tetsu
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 125 - +
  • [43] On the Security of Sponge-type Authenticated Encryption Modes
    Chakraborty, Bishwajit
    Jha, Ashwin
    Nandi, Mridul
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 93 - 119
  • [44] The security of the improvement on the generalization of threshold signature and authenticated encryption
    Lee, NY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (10) : 2364 - 2367
  • [45] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [46] Analysis of Authenticated Encryption Scheme for Wireless Sensor Networks
    Siddiqui, Adeel Ahmed
    Pirzada, Syed Jahanzeb Hussain
    2013 INTERNATIONAL CONFERENCE ON AEROSPACE SCIENCE & ENGINEERING (ICASE), 2013, : 27 - 30
  • [47] Authenticated encryption scheme with (t, n) shared verification
    Hsu, CL
    Wu, TC
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 117 - 120
  • [48] EnCash: An Authenticated Encryption Scheme Using Cellular Automata
    Banerjee, Tapadyoti
    Chowdhury, Dipanwita Roy
    JOURNAL OF CELLULAR AUTOMATA, 2022, 16 (5-6) : 443 - 461
  • [49] Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
    Agrawal, Megha
    Chang, Donghoon
    Kang, Jinkeon
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 22
  • [50] Impossible differential cryptanalysis of the Gimli authenticated encryption scheme
    Tan H.
    Shen B.
    Miao X.
    Zhang W.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (05): : 213 - 220