1 HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption Tetsu Iwata (Nagoya University, Japan) Kan Yasuda (NTT Corporation, Japan)

Slides:



Advertisements
Similar presentations
2 © 2004, Cisco Systems, Inc. All rights reserved. Scalable, Efficient Cryptography for Multiple Security Services David A. McGrew Cisco Systems, Inc.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Authenticated Encryption and Cryptographic Network Protocols David Brumley Carnegie Mellon University.
CIS 5371 Cryptography 3b. Pseudorandomness.
Length-Doubling Ciphers and Tweakable Ciphers Haibin Zhang Computer Science Department University of California, Davis
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
25th Feb 2009FSE1 1 Fast and Secure CBC-type MACs National Institute of Standards and Technology Mridul Nandi
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
A Block-Cipher Mode of Operation for Parallelizable Message Authentication John Black University of Nevada, Reno, USA Phillip Rogaway University of California,
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
1 Message Integrity CS255 Winter ‘06. 2 Message Integrity Goal: provide message integrity. No confidentiality. –ex: Protecting public binaries on disk.
#1 EAX A two-pass authenticated encryption mode Mihir BellarePhillip RogawayDavid Wagner U.C. San Diego U.C. Davis and U.C. Berkeley Chiang Mai University.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Cryptographic Hashing: Blockcipher-Based Constructions, Revisited Tom Shrimpton Portland State University.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Cryptography and Network Security
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
Dan Boneh Odds and ends Format preserving encryption Online Cryptography Course Dan Boneh.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Dan Boneh Using block ciphers Modes of operation: many time key (CTR) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
ISEP / Fakulta Elektrotecknika 1 Project Of Telecommunication Subject: Describe following “ MAC - Message Authentication Code " modes: Describe following.
Slide 1 PMAC: A Parallelizable Message Authentication Code Phillip Rogaway Department of Computer Science UC Davis + CMU
Two New Online Ciphers Mridul Nandi National Institute of Standards and Technology, Gaithersburg, MD Indocrypt 2008, Kharagpur.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
1 CIS 5371 Cryptography 4. Message Authentication Codes B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
1 Message authentication codes, modes of operation, and indifferentiability Kan Yasuda (NTT, Japan) ASK 2011 Aug. 31, Singapore.
Cryptography: Review Day David Brumley Carnegie Mellon University.
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
RSA-AES-SIV TLS Ciphersuites Dan Harkins. RSA-AES-SIV Ciphersuites What is being proposed? –New ciphersuites for TLS using SIV mode of authenticated encryption.
Doc.: IEEE /218r2 Submission July, 2002 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Should NIST Develop an Additional Version of GCM? July 26, 2007 Morris Dworkin, Mathematician Security Technology Group
Online Cryptography Course Dan Boneh
Cryptography Lecture 9 Arpita Patra © Arpita Patra.
PKCS #5 v2.0: Password-Based Cryptography Standard
Dan Boneh Authenticated Encryption CBC paddings attacks Online Cryptography Course Dan Boneh.
2010 CCSDS Spring Meeting, 5 May 2010 Portsmouth, VA, USA Encrypted Authentication ISO/IEC I. Aguilar – ESA/ESTEC.
Doc.: IEEE /634r1 Submission November 2001 Ferguson, Housley, WhitingSlide 1 AES Mode Choices OCB vs. Counter Mode with CBC-MAC Niels Ferguson,
Dan Boneh Authenticated Encryption Constructions from ciphers and MACs Online Cryptography Course Dan Boneh.
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
XCBC: A Version of the CBC MAC for Handling Arbitrary-Length Messages
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Lecture 6 Arpita Patra. Quick Recall and Today’s Roadmap >> MAC for fixed-length messages >> Domain Extension for MAC >> Authenticated Encryption:
Message Authentication Code
PRPs and PRFs CS255: Winter 2017
Cryptography Lecture 12.
Cryptography Lecture 7 Arpita Patra © Arpita Patra.
Cryptography Lecture 11.
Foundations of Network and Computer Security
SOFTWARE IMPLEMENTATION OF OCB MODE
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Cryptography Lecture 11.
Cryptography Lecture 12.
Topic 13: Message Authentication Code
Cryptography Lecture 10.
Cryptography Lecture 11.
Cryptography Lecture 10.
Counter With Cipher Block Chaining-MAC
Cipher-Based MAC Network Security.
Secret-Key Encryption
Presentation transcript:

1 HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption Tetsu Iwata (Nagoya University, Japan) Kan Yasuda (NTT Corporation, Japan) FSE Feb. 25, Leuven, Belgium

2 Table of contents Background and motivation  Authenticated encryption (AE)  Deterministic AE (DAE)  Previous work: SIV HBS (Hash Block Stealing)  How it works  Its efficiency and security

3 Background (AE) Blockcipher modes of operation Two goals:  To establish authenticity (data integrity)  To preserve privacy (data confidentiality) Authenticated Encryption (AE)  Concurrently achieves the two goals

4 Background (AE, nonce-based) AE  CCM, GCM, OCB, …  Usually uses a randomized salt or state-dependent value  Formalized as nonce-based AE [Rogaway 2001, 2002, 2004] Nonce  Never repeat the same value, or lose all security

5 Table of contents Background and motivation  Authenticated encryption (AE)  Deterministic AE (DAE)  Previous work: SIV HBS (Hash Block Stealing)  How it works  Its efficiency and security

6 Background (DAE) Nonce misuse  Settled by Deterministic Authenticated Encryption (DAE) [Rogaway – Shrimpton 2006] DAE  “Secure” even if the same value is used (all an adversary can do is to detect the repetition)

7 Background (How DAE works) Deterministic algorithms Encryption  Input: (Header H, Message M) Output: (Tag T, Encrypted Msg C) Decryption  Verifies (H, T, C)  Outputs either  or M

8 Security definition of DAE Enc H, M T, C Adversaries Cannot distinguish ? Dec H, T, C  / M Random H, M $$$  H, T, C  Real Ideal

9 Table of contents Background and motivation  Authenticated encryption (AE)  Deterministic AE (DAE)  Previous work: SIV HBS (Hash Block Stealing)  How it works  Its efficiency and security

10 SIV mode of operation A concrete DAE mode [Rogaway – Shrimpton Eurocrypt 2006] “MAC-then-Encrypt” Entirely blockcipher-based  Uses CMAC* (vectorized CMAC) for authentication  Uses CTR mode for encryption Requires two keys

11 Motivation: Can we construct a single-key DAE mode?

12 Table of contents Background and motivation  Authenticated encryption (AE)  Deterministic AE (DAE)  Previous work: SIV HBS (Hash Block Stealing)  How it works  Its efficiency and security

13 HBS (Hash Block Stealing) The HBS mode  Single-key  Also “MAC-then-Encrypt” style  New polynomial-hashing for MAC  “Odd” CTR (counter) mode for Enc

14 Vector-input (VI) polynomial hashing Motivation:  Two different inputs (H,M)  (H’,M’)  We may have H || M = H’ || M’  Cannot use string-input polynomial hash New notion: VI-  –AXU hash function For any (H,M)  (H’,M’) and Y Pr[ Hash L (H,M)  Hash L (H’,M’)=Y] ≤  Pr is over random hash keys L

15 How to construct VI-  -AXU hash Finite-field polynomial L = E K (0 n ) is the hashing key For header H = H 0 H 1 H 2 and message M = M 0 M 1 M 2 hash value S = L 7  L 5 H 0  L 3 H 1  LH 2  L 8  L 6 M 0  L 4 M 1  L 2 M 2 Use odd for header and even for message Note the additional leading terms

16 Produce tag and “Steal” hash Polynomial Hash HeaderMessage Tag EKEK S Steal the hash “block” and use it as IV for the CTR mode

17 “Odd” CTR mode M0M0 EKEK S   C0C0 M1M1 EKEK  C1C1 M2M2 EKEK  C2C2  XOR Integer x rep. as bit string Necessary for the security of HBS

18 Table of contents Background and motivation  Authenticated encryption (AE)  Deterministic AE (DAE)  Previous work: SIV HBS (Hash Block Stealing)  How it works  Its efficiency and security

19 Efficiency comparison SIVHBS # of blockcipher keys 21 # of calls to blockcipher h + 2m + 2m + 2 # of multiplications 0h + m + 2 Header h blocks, message m blocks

20 Security of HBS mode Secure under the assumption that the blockcipher E is a SPRP Security theorem: Adv DAE (HBS) ≤ Adv SPRP (E) + 33q 2 (1+h+2m) 2 /2 n q max # of queries h max length of each header m max length of each message

21 Thank you very much.