Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.

Slides:



Advertisements
Similar presentations
Dan Boneh Message integrity Message Auth. Codes Online Cryptography Course Dan Boneh.
Advertisements

ElGamal Security Public key encryption from Diffie-Hellman
Dan Boneh Using block ciphers Modes of operation: one time key Online Cryptography Course Dan Boneh example: encrypted , new key for every message.
Trusted 3rd parties Basic key exchange
Online Cryptography Course Dan Boneh
Hash Function. What are hash functions? Just a method of compressing strings – E.g., H : {0,1}*  {0,1} 160 – Input is called “message”, output is “digest”
Message Authentication Codes (MACs) and Hashes David Brumley Carnegie Mellon University Credits: Many slides from Dan Boneh’s June 2012.
1 PRPs and PRFs CS255: Winter Abstract ciphers: PRPs and PRFs, 2.Security models for encryption, 3.Analysis of CBC and counter mode Dan Boneh, Stanford.
Dan Boneh Authenticated Encryption Active attacks on CPA-secure encryption Online Cryptography Course Dan Boneh.
Authenticated Encryption and Cryptographic Network Protocols David Brumley Carnegie Mellon University.
1 Brief PRP-PRF Recap CS255 Winter ‘06. 2 PRPs and PRFs PRF: F: K  X  Y such that: exists “efficient” algorithm to eval. F(k,x) PRP: E: K  X  X such.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
New Bounds for PMAC, TMAC, and XCBC Kazuhiko Minematsu and Toshiyasu Matsushima, NEC Corp. and Waseda University Fast Software Encryption 2007, March 26-28,
Cryptography for Backup Navigation
A Block-Cipher Mode of Operation for Parallelizable Message Authentication John Black University of Nevada, Reno, USA Phillip Rogaway University of California,
1 Message Integrity CS255 Winter ‘06. 2 Message Integrity Goal: provide message integrity. No confidentiality. –ex: Protecting public binaries on disk.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
Dan Boneh Collision resistance Generic birthday attack Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
Cryptography Overview CS155. Cryptography Is A tremendous tool The basis for many security mechanisms Is not The solution to all security problems Reliable.
Active attacks on CPA-secure encryption
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Chosen ciphertext attacks Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Key Derivation Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Dan Boneh Odds and ends Format preserving encryption Online Cryptography Course Dan Boneh.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
Dan Boneh Using block ciphers Modes of operation: many time key (CTR) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Slide 1 PMAC: A Parallelizable Message Authentication Code Phillip Rogaway Department of Computer Science UC Davis + CMU
Dan Boneh Using block ciphers Modes of operation: many time key (CBC) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
Dan Boneh Collision resistance Introduction Online Cryptography Course Dan Boneh.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
1 Message authentication codes, modes of operation, and indifferentiability Kan Yasuda (NTT, Japan) ASK 2011 Aug. 31, Singapore.
Dan Boneh Message Integrity CBC-MAC and NMAC Online Cryptography Course Dan Boneh.
Odds and ends Tweakable encryption
Cryptography: Review Day David Brumley Carnegie Mellon University.
Template vertLeftWhite2 Authenticated Encryption Attacking non-atomic decryption Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers Stream ciphers are semantically secure Online Cryptography Course Dan Boneh Goal: secure PRG ⇒ semantically secure stream cipher.
Message Authentication Codes (MACs) and Hashes David Brumley Carnegie Mellon University Credits: Many slides from Dan Boneh’s June 2012.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Dan Boneh Collision resistance The Merkle-Damgard Paradigm Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Fermat and Euler Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
Online Cryptography Course Dan Boneh
Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Cryptography Lecture 9 Arpita Patra © Arpita Patra.
Dan Boneh Authenticated Encryption CBC paddings attacks Online Cryptography Course Dan Boneh.
CS555Spring 2012/Topic 151 Cryptography CS 555 Topic 15: HMAC, Combining Encryption & Authentication.
Dan Boneh Authenticated Encryption Constructions from ciphers and MACs Online Cryptography Course Dan Boneh.
XCBC: A Version of the CBC MAC for Handling Arbitrary-Length Messages
Lecture 3 Overview of Cryptography A Practitioner Perspective
Message Authentication Codes
Using block ciphers Review: PRPs and PRFs
Message Authentication Codes (MACs) and Hashes
PRPs and PRFs CS255: Winter 2017
Cryptography Lecture 13.
Introduction to Symmetric-key and Public-key Cryptography
Fast and Secure CBC-type MACs
Topic 13: Message Authentication Code
Cryptography Lecture 14.
Cryptography Lecture 13.
Cryptography Lecture 13.
Presentation transcript:

Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh

Dan Boneh ECBC and NMAC are sequential. Can we build a parallel MAC from a small PRF ??

Dan Boneh Construction 3: PMAC – parallel MAC P(k, i): an easy to compute function m[0]m[1]m[2]m[3]   F(k 1,  ) tag  P(k,0) P(k,1) P(k,2) P(k,3) Let F: K × X X be a PRF Define new PRF F PMAC : K 2 × X ≤L X Padding similar to CMAC key = (k, k 1 )

Dan Boneh PMAC: Analysis PMAC Theorem: For any L>0, If F is a secure PRF over (K,X,X) then F PMAC is a secure PRF over (K, X  L, X). For every eff. q-query PRF adv. A attacking F PMAC there exists an eff. PRF adversary B s.t.: Adv PRF [A, F PMAC ]  Adv PRF [B, F] + 2 q 2 L 2 / |X| PMAC is secure as long as qL << |X| 1/2

Template vertLeftWhite2 PMAC is incremental Suppose F is a PRP. When m[1] m’[1] can we quickly update tag? m[0]m[1]m[3]m[4]   F(k 1,  ) tag  P(k,0) P(k,1) P(k,2) P(k,3) no, it can’t be done do F -1 (k 1,tag) F ( k 1, m[1] P(k,1) ) F ( k 1, m’[1] P(k,1) ) do F -1 (k 1,tag) F ( k 1, m’[1] P(k,1) ) do tag F ( k 1, m[1] P(k,1) ) F ( k 1, m’[1] P(k,1) ) Then apply F(k 1, ⋅ )

Dan Boneh One time MAC (analog of one time pad) For a MAC I=(S,V) and adv. A define a MAC game as: Def: I=(S,V) is a secure MAC if for all “ efficient ” A: Adv MAC [A,I] = Pr[Chal. outputs 1] is “ negligible. ” Chal.Adv. kKkK (m,t) m 1  M t 1  S(k,m 1 ) b=1 if V(k,m,t) = `yes ’ and (m,t) ≠ (m 1,t 1 ) b=0 otherwise b

Dan Boneh One-time MAC: an example Can be secure against all adversaries and faster than PRF-based MACs Let q be a large prime (e.g. q = ) key = (k, a) ∈ {1,…,q} 2 (two random ints. in [1,q] ) msg = ( m[1], …, m[L] ) where each block is 128 bit int. S( key, msg ) = P msg (k) + a (mod q) where P msg (x) = m[L]  x L + … + m[1]  x is a poly. of deg L. Fact: given S( key, msg 1 ) adv. has no info about S( key, msg 2 )

Dan Boneh One-time MAC ⇒ Many-time MAC Let (S,V) be a secure one-time MAC over (K I,M, {0,1} n ). Let F: K F × {0,1} n {0,1} n be a secure PRF. Carter-Wegman MAC: CW ( (k 1,k 2 ), m ) = ( r, F(k 1,r) S(k 2,m) ) for random r {0,1} n. Thm: If (S,V) is a secure one-time MAC and F a secure PRF then CW is a secure MAC outputting tags in {0,1} 2n. fast long inp slow but short inp

Template vertLeftWhite2 How would you verify a CW tag (r, t) on message m ? Recall that V(k 2,m,.) is the verification alg. for the one time MAC. CW( (k 1,k 2 ), m) = (r, F(k 1,r) S(k 2,m) ) Run V ( k 2, m, F(k 1, r) t) ) Run V ( k 2, m, F(k 1, t) r) ) Run V ( k 2, m, r ) Run V ( k 2, m, t )

Dan Boneh Construction 4: HMAC (Hash-MAC) Most widely used MAC on the Internet. … but, we first we need to discuss hash function.

Dan Boneh Further reading J. Black, P. Rogaway: CBC MACs for Arbitrary-Length Messages: The Three- Key Constructions. J. Cryptology 18(2): (2005) K. Pietrzak: A Tight Bound for EMAC. ICALP (2) 2006: J. Black, P. Rogaway: A Block-Cipher Mode of Operation for Parallelizable Message Authentication. EUROCRYPT 2002: M. Bellare: New Proofs for NMAC and HMAC: Security Without Collision- Resistance. CRYPTO 2006: Y. Dodis, K. Pietrzak, P. Puniya: A New Mode of Operation for Block Ciphers and Length-Preserving MACs. EUROCRYPT 2008:

Dan Boneh End of Segment