#1 EAX A two-pass authenticated encryption mode Mihir BellarePhillip RogawayDavid Wagner U.C. San Diego U.C. Davis and U.C. Berkeley Chiang Mai University.

Slides:



Advertisements
Similar presentations
2 © 2004, Cisco Systems, Inc. All rights reserved. Scalable, Efficient Cryptography for Multiple Security Services David A. McGrew Cisco Systems, Inc.
Advertisements

ECE454/CS594 Computer and Network Security
“Advanced Encryption Standard” & “Modes of Operation”
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1`` ```` ```` ```` ```` ```` ```` ```` ```` ```` `` AEGIS A Fast Authenticated Encryption Algorithm Hongjun Wu Bart Preneel Nanyang Technological University.
Dan Boneh Authenticated Encryption Active attacks on CPA-secure encryption Online Cryptography Course Dan Boneh.
Authenticated Encryption and Cryptographic Network Protocols David Brumley Carnegie Mellon University.
CIS 5371 Cryptography 3b. Pseudorandomness.
Length-Doubling Ciphers and Tweakable Ciphers Haibin Zhang Computer Science Department University of California, Davis
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
A Block-Cipher Mode of Operation for Parallelizable Message Authentication John Black University of Nevada, Reno, USA Phillip Rogaway University of California,
1 CS 577 “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks” Chris Karlof, Naveen Sastry, David Wagner UC Berkeley Summary presented.
Slide 1 OCB: A Bock-Cipher Mode of Operation for Efficient Authenticated Encryption Phillip Rogaway UC Davis
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Sep 6 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Lecture 23 Symmetric Encryption
Slide 1 OCB: A Bock-Cipher Mode of Operation for Efficient Authenticated Encryption Phillip Rogaway ~
Slide 1 OCB Mode Phillip Rogaway Department of Computer Science UC Davis + Chiang Mai Univ +66.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Dan Boneh Authenticated Encryption Chosen ciphertext attacks Online Cryptography Course Dan Boneh.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
CS 4/585: Cryptography Tom Shrimpton FAB
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Dan Boneh Using block ciphers Modes of operation: many time key (CTR) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Applied Cryptography Spring 2015 Chaining Modes. What happens when the clear text is longer than the block length k? Most simple solution — encrypt each.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Slide 1 PMAC: A Parallelizable Message Authentication Code Phillip Rogaway Department of Computer Science UC Davis + CMU
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Dan Boneh Using block ciphers Modes of operation: many time key (CBC) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
IND-CPA and IND-CCA Concepts Summary  Basic Encryption Security Definition: IND-CPA  Strong Encryption Security Definition: IND-CCA  IND-CPA, IND-CCA.
Two New Online Ciphers Mridul Nandi National Institute of Standards and Technology, Gaithersburg, MD Indocrypt 2008, Kharagpur.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
1 The XCBC-XOR, XECB-XOR and XECB-MAC Modes Virgil D. GligorPompiliu Donescu VDG Inc 6009 Brookside Drive Chevy Chase, Maryland {gligor,
Presentation Road Map 1 Authenticated Encryption 2 Message Authentication Code (MAC) 3 Authencryption and its Application Objective Modes of Operation.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
RSA-AES-SIV TLS Ciphersuites Dan Harkins. RSA-AES-SIV Ciphersuites What is being proposed? –New ciphersuites for TLS using SIV mode of authenticated encryption.
Should NIST Develop an Additional Version of GCM? July 26, 2007 Morris Dworkin, Mathematician Security Technology Group
Dan Boneh Authenticated Encryption CBC paddings attacks Online Cryptography Course Dan Boneh.
Doc.: IEEE /634r1 Submission November 2001 Ferguson, Housley, WhitingSlide 1 AES Mode Choices OCB vs. Counter Mode with CBC-MAC Niels Ferguson,
1 HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption Tetsu Iwata (Nagoya University, Japan) Kan Yasuda (NTT Corporation, Japan)
Dan Boneh Authenticated Encryption Constructions from ciphers and MACs Online Cryptography Course Dan Boneh.
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
Cryptography Lecture 6 Arpita Patra. Quick Recall and Today’s Roadmap >> MAC for fixed-length messages >> Domain Extension for MAC >> Authenticated Encryption:
Message Authentication Code
PRPs and PRFs CS255: Winter 2017
Block Cipher Modes CS 465 Make a chart for the mode comparisons
Cryptography Lecture 12.
AES Mode Choices OCB vs. Counter Mode with CBC-MAC
Cryptography Lecture 16.
Block cipher and modes of encryptions
Foundations of Network and Computer Security
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Foundations of Network and Computer Security
Block Ciphers (Crypto 2)
Cryptography Lecture 12.
Topic 13: Message Authentication Code
Cryptography Lecture 11.
Counter With Cipher Block Chaining-MAC
Counter Mode, Output Feedback Mode
Secret-Key Encryption
Presentation transcript:

#1 EAX A two-pass authenticated encryption mode Mihir BellarePhillip RogawayDavid Wagner U.C. San Diego U.C. Davis and U.C. Berkeley Chiang Mai University (Thailand)

#2 “Authenticated encryption” (AE) modes of operation Encrypt for confidentiality Authenticate for integrity Goal: “Auth. encryption with associated data” (AEAD) Support “associated data” (AD) - e.g., packet headers - that should be authenticated but not encrypted Additional goals: Flexible, general-purpose, suitable for standardization Patent-unencumbered Provably secure Our solution: EAX Summary of our work

#3 1 st generation: ad-hoc schemes Many schemes proposed and used in practice: CBC with xor checksum PCBC Kerberos: CBC with CRC checksum IPSec’s old ESP o AH IPSec’s new ESP SSL/TLS SSH IEEE WEP IAPCBC None of these were proven secure All of these have security defects!

#4 2 nd generation: provable security Generic-composition: encrypt-then-authenticate Advantages: + Provably secure [Bellare,Namprempre] [Krawczyk] + Supports associated data: a AEAD scheme + Unpatented Disadvantages: - Strict IV requirements if one uses standard enc schemes - More key material, longer key-setup time - No standard, no specs

#5 3 rd generation: One-pass provably secure AE(AD) IAPM [Jutla], OCB [Rogaway], XCBC [Gligor, Donescu] Advantages: + Encrypt and authenticate in one pass + Fast: takes about n block-cipher calls to process n blocks of data Disadvantages: - Some modes can’t handle “associated data” - Some modes are not fully specified - All are patent-encumbered Due to patent concerns, adoption of these modes has been limited

#6 4 th generation: Unpatented two-pass AEAD CCM: CTR + CBC-MAC [Whiting, Housley, Ferguson] EAX: builds on CTR and OMAC CWC: builds on CTR and hash127 [Kohno, Viega, Whiting] GCM: builds on CTR and GF(2 128 ) univ hash [Viega, Whiting] Caveat: Two-pass modes are typically ~ 2x slower than one-pass modes, in software

#7 CCMEAXCWCGCM Provably secure? Unpatented? Any length nonce?   One key? On-line?  Can preprocess static headers/AD?  Fully parallelizable?  Preserves alignment?  Fully specified? Comparison of 4 th generation schemes

#8 OMAC [Iwata, Kurosawa] L =  (0 n ) 2L = msb(L)? L<<1 : L<<1  0x87 4L = 2(2L) “Tweaked” OMAC: OMAC k T (x) = OMAC k (T || x)

#9 Security of OMAC  Theorem [slight improvement of [IK]] Suppose there is an adversary A that attacks OMAC  [ E ] using time t and  blocks worth of queries getting PRF-advantage Adv prf =  Then there is an adversary B that attacks E using time t + tiny and  + 1 blocks of text and getting PRP-advantage Adv prp =  – (  2 /2 n OMAC  [ E ] E

#10 EAX input output

#11 EAX2 input output

#12 Auth Encryption with Associated Data (AEAD) Syntax of an AEAD scheme: E: Key  Nonce  Header  Plaintext  Ciphertext D: Key  Nonce  Header  Ciphertext  Plaintext  {invalid} Security of an AEAD scheme: Privacy (≈ IND-CPA) next slide Integrity (≈ INT-CTXT) following slide

#13 Privacy of an AEAD Scheme A is not allowed to repeat an N -value (nonces should be unique) Adv PRIV ( A ) = Pr[ A Real = 1] – Pr[ A Rand = 1]  A E K (M) Real N H M N,H [RBB],[BDJR],[GM],[R] Real world N H M Rand random string A Ideal world

#14 Integrity of an AEAD Scheme A N H M Real Adv AUTH ( A ) = Pr[ A Real forges ] N* H* C* Adversary A forges if it outputs N* H* C* s.t. C* is valid (it decrypts to a message, not to invalid ) There was no earlier query N* H* M* that returned C*  E K (M) N,H [RBB],[BR],[KY],[GMR],[R] A is not allowed to repeat an N -value

#15 Security of EAX Theorem Suppose there is an adversary A that attacks EAX[ E ] using time t and  blocks of chosen text getting privacy or authenticity Adv = . Then there is an adversary B that attacks E using time t + tiny and  + tiny blocks of text and getting PRP-advantage Adv prp =  – 11  2 /2 n. If you believe that E is a good block cipher, you are forced to believe that EAX[ E ] is a good AEAD scheme. EAX[ E ] E

#16 Why use EAX? EAX is secure Provably secure, if underlying block cipher is secure Single API for naïve programmers avoids many pitfalls (e.g., poor IV handling, encrypt without auth, etc.) EAX is easy to use One mode of operation provides everything you need Nonces need only be non-repeating (don’t need to be random) Nonces, headers, and messages can be of any bit length EAX is good for performance On-line: Can process streaming data on-the-fly Can pre-process static headers No encodings, no unaligned operations Single key minimizes space and key-schedule operations Caveat: EAX is 2x slower than IAPM/OCB/XCBC EAX is unpatented & free for all uses (as far as we know)

#17 Questions?