Length-Doubling Ciphers and Tweakable Ciphers Haibin Zhang Computer Science Department University of California, Davis

Slides:



Advertisements
Similar presentations
2 © 2004, Cisco Systems, Inc. All rights reserved. Scalable, Efficient Cryptography for Multiple Security Services David A. McGrew Cisco Systems, Inc.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 PRPs and PRFs CS255: Winter Abstract ciphers: PRPs and PRFs, 2.Security models for encryption, 3.Analysis of CBC and counter mode Dan Boneh, Stanford.
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
1 Brief PRP-PRF Recap CS255 Winter ‘06. 2 PRPs and PRFs PRF: F: K  X  Y such that: exists “efficient” algorithm to eval. F(k,x) PRP: E: K  X  X such.
Beyond-birthday-bound Security Based on Tweakable Block Ciphers Kazuhiko Minematsu NEC Corporation Fast Software Encryption 2009, Leuven, Belgium.
1 Introduction to Practical Cryptography Lecture 3 Block Ciphers.
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
New Bounds for PMAC, TMAC, and XCBC Kazuhiko Minematsu and Toshiyasu Matsushima, NEC Corp. and Waseda University Fast Software Encryption 2007, March 26-28,
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
A Block-Cipher Mode of Operation for Parallelizable Message Authentication John Black University of Nevada, Reno, USA Phillip Rogaway University of California,
Slide 1 OCB: A Bock-Cipher Mode of Operation for Efficient Authenticated Encryption Phillip Rogaway UC Davis
#1 EAX A two-pass authenticated encryption mode Mihir BellarePhillip RogawayDavid Wagner U.C. San Diego U.C. Davis and U.C. Berkeley Chiang Mai University.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CS470, A.SelcukLucifer & DES1 Block Ciphers Lucifer & DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Intro To Encryption Exercise 4. 2 Defining Pseudo-Random Permutation Let A be alg. with oracle to a function from {0,1} k to {0,1} k Notation: let A.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
Lecture 23 Symmetric Encryption
Slide 1 OCB: A Bock-Cipher Mode of Operation for Efficient Authenticated Encryption Phillip Rogaway ~
Slide 1 OCB Mode Phillip Rogaway Department of Computer Science UC Davis + Chiang Mai Univ +66.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Cryptography Lecture 3 Arpita Patra.
Hardness Assumptions Related to Ad-Hoc Constructions Shai Halevi February 22, 2007.
TWOFISH ENCRYPTION ALGORITHM CS–627: Cryptology Fall 2004 Horatiu Paul Stancu.
Chapter 20 Symmetric Encryption and Message Confidentiality.
1 How to Encipher Messages on a Small Domain Deterministic Encryption and the Thorp Shuffle Ben Morris University of California, Davis Dept of Mathematics.
Dan Boneh Odds and ends Format preserving encryption Online Cryptography Course Dan Boneh.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Block ciphers Structure of a multiround block cipher
Kentucky Presentation November, 2006 Cryptography from an art to a science Ganesh Sundaram.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Slide 1 PMAC: A Parallelizable Message Authentication Code Phillip Rogaway Department of Computer Science UC Davis + CMU
Dan Boneh Using block ciphers Modes of operation: many time key (CBC) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Two New Online Ciphers Mridul Nandi National Institute of Standards and Technology, Gaithersburg, MD Indocrypt 2008, Kharagpur.
1 Message authentication codes, modes of operation, and indifferentiability Kan Yasuda (NTT, Japan) ASK 2011 Aug. 31, Singapore.
Lecture 23 Symmetric Encryption
Odds and ends Tweakable encryption
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Cryptography Lecture 6 Arpita Patra © Arpita Patra.
Cryptography and Network Security
CS555Spring 2012/Topic 81 Cryptography CS 555 Topic 8: Pseudorandom Functions and CPA Security.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Online Cryptography Course Dan Boneh
2010 CCSDS Spring Meeting, 5 May 2010 Portsmouth, VA, USA Encrypted Authentication ISO/IEC I. Aguilar – ESA/ESTEC.
1 HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption Tetsu Iwata (Nagoya University, Japan) Kan Yasuda (NTT Corporation, Japan)
Dan Boneh Authenticated Encryption Constructions from ciphers and MACs Online Cryptography Course Dan Boneh.
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
XCBC: A Version of the CBC MAC for Handling Arbitrary-Length Messages
Cryptography Lecture 6 Arpita Patra. Quick Recall and Today’s Roadmap >> MAC for fixed-length messages >> Domain Extension for MAC >> Authenticated Encryption:
CS480 Cryptography and Information Security
PRPs and PRFs CS255: Winter 2017
Cryptography Lecture 12.
Cryptography Lecture 18.
Cryptography Lecture 11.
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Block Ciphers: DES and AES
Cryptography Lecture 8.
Block Ciphers (Crypto 2)
Cryptography Lecture 9.
Cryptography Lecture 11.
Cryptography Lecture 10.
Cryptography Lecture 17.
Counter With Cipher Block Chaining-MAC
Simple Hash Functions Network Security.
Presentation transcript:

Length-Doubling Ciphers and Tweakable Ciphers Haibin Zhang Computer Science Department University of California, Davis

Our Contribution 2  HEM: a VIL cipher on [n..2n-1]  THEM: a VIL tweakable cipher on [n..2n-1]  Both HEM and THEM uses two blockcipher calls

Symmetric-Key Encryption (Confidentiality Modes of Operation) 3  Probabilistic/stateful encryption (length-expanding) IND-CPA: CBC, CTR, … (IND-CCA) AE :IND-CPA+INT-CTXT: CCM, GCM, OCB, …  Deterministic encryption (length-preserving encryption; cipher) PRP (CPA) security: SPRP (CCA) security: CMC, EME2, … SPRP ciphers are useful in disk sector encryption, encipher and encode applications, hybrid encryption, … IEEE P (EME2)

Blockciphers Adv (A) = Pr[A  1] – Pr[A   1] E prp Adv (A) = Pr[A  1] – Pr[A   1] E A EKEK E K (  ) 11  () ()  (  ) 11 11 11 PRP (CPA) security PRP (CCA) security random permutation over {0,1} n 4 E : K  {0,1} n  {0,1} n + - EKEK E K  EKEK prp + -

General Ciphers A εK()εK() 11  () ()  (  ) 11 ε K (  ) Adv (A) = Pr[A  1] – Pr[A   1] ε prp Adv (A) = Pr[A  1] – Pr[A   1] prp 11 11 PRP (CPA) security PRP (CCA) security ε εK() εK() 5 ε : K  X  X εK() εK(),ε K (  ) random length-preserving permutation over X A cipher for | X |=[n..2n-1]

6 A E K (  ) 11  (  ) 11 random permutation over Perm( T, n) E K (  ) Adv (A) = Pr[A  1] – Pr[A   1] Ε prp Adv (A) = Pr[A  1] – Pr[A   1] prp 11 PRP security E ~ ~ ~ ~ ~ ~~ Tweakable Blockcipher Security E : K  T  {0,1} n  {0,1} n ~ [Liskov, Rivest, Wagner 2002] EKEK 11 E K  E K 

7 A E K (  ) 11  (  ) 11 random permutation over Perm( T, X ) E K (  ) Adv (A) = Pr[A  1] – Pr[A   1] Ε prp Adv (A) = Pr[A  1] – Pr[A   1] prp 11 PRP security E ~ ~ ~ ~ ~ ~~ Tweakable Cipher Security E : K  T  X  X ~ [Liskov, Rivest, Wagner 2002] EKEK 11 E K  E K  A tweakable cipher for | X |=[n..2n-1]

8  A historically and theoretically interesting problem How is Length-Doubling Cipher ([n..2n-1]) USEFUL? A FIL cipher from n to 2n “Doubling” the length of a cipher [Luby and Rackoff, 1988] Our Goal: A VIL cipher from n to [n..2n-1] “Doubling” the length of a cipher in the VIL sense

9 A tweakable cipher of length [n..2n-1] [Rogaway and Zhang, 2011] How is Length-Doubling Cipher ([n..2n-1]) USEFUL? TC3* Online Cipher

10 How is Length-Doubling Cipher ([n..2n-1]) USEFUL? Ciphertext Stealing did not seem to do a good job. [IEEE, P1619] XTS Mode A tweakable cipher of length [n..2n-1]

11 EME2 [Halevi, 2004] Four-round Feistel XLS[Ristenpart,Rogaway,2007] Previous constructions for [n..2n-1]

Two-blockcipher-call solution? Our algorithms  Two blockcipher calls  Two AXU hash calls  One mixing function call (inexpensive; non-cryptographic tool) 12

AXU Hash Function  Almost XOR Universal hash functions:  For our constructions, X = Y = {0,1} n H : K  X  Y H : K  {0,1} n  {0,1} n Essential for efficiency and security 13 For all X   X ’ and all C  Y, Pr[H k (x)  H k (X ’ ) = C] ≤ ε H : K  X  Y H K (x) =K  X Galois Field Multiplication [Krawczyk, 1994]

Mixing Function  Mixing Function: 14 A construction by Ristenpart and Rogaway takes three xors and a single one-bit circular rotation. Let mix L ( ,  ) and mix R ( ,  ) be the left and right projection of mix respectively. For any A  S, mix L (A,  ), mix L ( ,A), mix R (A,  ), and mix R ( ,A) are all permutations. mix : S  S  S  S [Rogaway and Ristenpart, 2007]

An inefficient 2-blockcipher-call solution Variationally universal hash [Rogaway and Krovetz, 2006]

Feistel networks [Luby and Rackoff, 1988][Naor and Reingold, 1997][Patel, Ramzan and Sundaram,1997] A FIL cipher of length 2n An improved FIL cipher of length 2n A FIL cipher of length ≥ 2n

FHEM: A FIL Cipher of length n+s AXU Hash Blockcipher Encryption AXU Hash MIX function 1.permutation 2. SPRP Blockcipher Encryption

FHEM of length n+s security Theorem: Let  FHEM[H, Perm(n),mix]. If A asks at most q queries then  Adv (A)  3 q 2 /2 n prp + -

FHEM is not VIL secure 0n0n 0 0n0n 00 If D 1 =C 1 output 1 else 0

FHEM is not VIL secure 0n0n 0 0n0n 00 If D 1 =C 1 output 1 else 0

21 HEM: A Length-Doubling Cipher Can be Precomputed ! FHEMHEM

HEM security Theorem: Let  HEM[H, Perm(n),mix]. If A asks at most q queries then  Adv (A)  3 q 2 /2 n prp + -

23 THEM: A Length-Doubling Tweakable Cipher A way of adding tweaks

Theorem: Let  THEM[H, Perm(n),mix]. If A asks at most q queries then  Adv (A)  3 q 2 /2 n prp + - THEM security ~ ~

25 A More Compact Variant (Tweak Stealing)

Open questions 26  A more elegant cipher on X  {0,1} [n..2n)  How do we achieve an efficient VIL cipher with the domain {0,1} >n using the least blockcipher calls?  (Informally) Does there exist a lower bound for the number of blockcipher calls for an efficient SPRP secure cipher with the domain  {0,1} >n ?

Thank you! 27