Doc.: IEEE 802.11-01/378 Submission July 2001 Phillip RogawaySlide 1 OCB Mode Phillip Rogaway Department of Computer Science UC Davis + CMU

Slides:



Advertisements
Similar presentations
Off-the-Record Communication, or, Why Not To Use PGP
Advertisements

CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
1`` ```` ```` ```` ```` ```` ```` ```` ```` ```` `` AEGIS A Fast Authenticated Encryption Algorithm Hongjun Wu Bart Preneel Nanyang Technological University.
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
A Block-Cipher Mode of Operation for Parallelizable Message Authentication John Black University of Nevada, Reno, USA Phillip Rogaway University of California,
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Wired Equivalent Privacy (WEP)
Slide 1 OCB: A Bock-Cipher Mode of Operation for Efficient Authenticated Encryption Phillip Rogaway UC Davis
#1 EAX A two-pass authenticated encryption mode Mihir BellarePhillip RogawayDavid Wagner U.C. San Diego U.C. Davis and U.C. Berkeley Chiang Mai University.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Doc.: IEEE /156ar0 Submission March 2002 RogawaySlide 1 Some Comments on OCB and CCM Phil Rogaway UC Davis and Chiang Mai Univ.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Slide 1 OCB: A Bock-Cipher Mode of Operation for Efficient Authenticated Encryption Phillip Rogaway ~
Slide 1 OCB Mode Phillip Rogaway Department of Computer Science UC Davis + Chiang Mai Univ +66.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
On OAEP, PSS, and S/MIME John Linn RSA Laboratories S/MIME WG, San Diego IETF, 13 December 2000.
WEP Protocol Weaknesses and Vulnerabilities
Doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 1 OCB Mode Phillip Rogaway Department of Computer Science UC Davis + CMU
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
Slide 1 PMAC: A Parallelizable Message Authentication Code Phillip Rogaway Department of Computer Science UC Davis + CMU
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Doc.: Linksec CipherSuites Submission August David Johnston, IntelSlide 1 LinkSec CipherSuites? David Johnston
Network Security – Special Topic on Skype Security.
Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Lecture 2: Introduction to Cryptography
Lecture 5.1: Message Authentication Codes, and Key Distribution
1 The XCBC-XOR, XECB-XOR and XECB-MAC Modes Virgil D. GligorPompiliu Donescu VDG Inc 6009 Brookside Drive Chevy Chase, Maryland {gligor,
Presentation Road Map 1 Authenticated Encryption 2 Message Authentication Code (MAC) 3 Authencryption and its Application Objective Modes of Operation.
Should NIST Develop an Additional Version of GCM? July 26, 2007 Morris Dworkin, Mathematician Security Technology Group
Doc.: IEEE /634r1 Submission November 2001 Ferguson, Housley, WhitingSlide 1 AES Mode Choices OCB vs. Counter Mode with CBC-MAC Niels Ferguson,
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
XCBC: A Version of the CBC MAC for Handling Arbitrary-Length Messages
Cryptography Lecture 6 Arpita Patra. Quick Recall and Today’s Roadmap >> MAC for fixed-length messages >> Domain Extension for MAC >> Authenticated Encryption:
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Message Authentication Code
Information Security and Management (Abstract) 5
Password Management Limit login attempts Encrypt your passwords
AES Mode Choices OCB vs. Counter Mode with CBC-MAC
Security through Encryption
Block cipher and modes of encryptions
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Foundations of Network and Computer Security
Security Of Wireless Sensor Networks
Foundations of Network and Computer Security
Outline Using cryptography in networks IPSec SSL and TLS.
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Block Ciphers (Crypto 2)
Security of Wireless Sensor Networks
Lecture 4.1: Hash Functions, and Message Authentication Codes
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 1 OCB Mode Phillip Rogaway Department of Computer Science UC Davis + CMU Presentation – Security (TG i) - Portland, Oregon

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 2 What am I? A cryptographer (MIT  IBM  UCD) Practice-oriented provable security – 1993  present. Research program jointly envisioned with M. Bellare Approach applied to many cryptographic problems Work picked up in various standards & draft standards: (OEAP, DHIES, PSS, PSS-R) by (ANSI, IEEE, ISO, PKCS, SECG) What am I not ? An expert in networking A businessman An attorney

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 3 Two Cryptographic Goals Privacy What the Adversary sees tells her nothing of significance about the underlying message M that the Sender sent Authenticity The Receiver is sure that the string he receives was sent (in exactly this form) by the Sender Authenticated Encryption Achieves both privacy and authenticity

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 4 You may or may not care about privacy, but you almost certainly care about authenticity: without it, an adversary can completely disrupt the operation of the network. The authenticity risk is higher in a wireless environment, as the adversary can easily inject her own packets. Standard privacy methods do not provide authenticity, and simple ways to modify them (eg, “add redundancy then encrypt”) don't work Authenticity is Essential

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 5 Generic Composition Usually called a Message Authentication Code ( MAC ) Glue together an Encryption scheme + Message Integrity Code (MIC) Traditional approach to authenticated encryption Folklore approach. See [Bellare, Namprempre] and [Krawczyk] for analysis.

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 6 Some Algorithms for Generic Composition Good in HW Assurance Simplicity Fast in SW Fast key setup RC4 CTR-AES CBC-AES CBCMAC-AES new NMH/MMH MIC UMAC-AES Parallelizable

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 7 Generic Composition: Conclusion At this point in time, in this application domain, CBC-AES / CTR-AES + CBCMAC-AES is the natural approach for generic composition Cost of the above, in SW P3: about: 16 cpb + 16 cpb = 32 cpb Eg: 54 Mb/s, 1GHz processor  22 % of processor People hate paying 2  the cost to encrypt

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 8 Trying to do Better Numerous attempts to make privacy + authenticity cheaper One approach: stick with generic composition, but find cheaper privacy algorithm and cheaper authenticity algorithms Make authenticity an “incidental” adjunct to privacy within a conventional-looking mode CBC-with-various-checksums (wrong) PCBC in Kerberos (wrong) [Gligor, Donescu 99] (wrong) [Jutla - Aug 00] First correct solution Jutla described two modes, IACBC and IAPM A lovely start, but many improvements possible OCB: inspired by IAPM, but many new characteristics

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 9 What is OCB? Authenticated encryption: privacy + authenticity in one shot Uses any block cipher (you’d use AES) Computational cost  cost of CBC Good in SW or HW (since AES is) Lots of nice characteristics designed in:  |M| / 128  + 2 block-cipher calls to encrypt M Uses any nonce (needn’t be unpredictable) Works on messages of any length Creates minimum length ciphertext Uses only a single AES key, each AES keyed with it Quick key setup – suitable for single-message sessions Essentially endian-neutral Fully parallelizable Provably secure: if you break OCB-AES you’ve broken AES

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 10 Diagram of OCB

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 11 Pseudocode for OCB-AES algorithm OCB-Encrypt K (Nonce, M) L(0) = AES K (0) L(-1) = lsb(L(0))? (L(0) >> 1)  Const43 : (L(0) >>1) for i = 1 to 7 do L(i) = msb(L(i-1))? (L(i) << 1)  Const87 : (L(i-1) <<1) Partition M into M[1]... M[m] // each 128 bits, except M[m] may be shorter Offset = AES K (Nonce  L(0)) for i=1 to m-1 do Offset = Offset  L(ntz(i)) C[i] = AES K (M[i]  Offset)  Offset Offset = Offset  L(ntz(m)) Pad = AES K (len(M[m])  Offset  L(-1)) C[m] = M[m]  (first | M[m] | bits of Pad) Checksum = M[1] ...  M[m-1]  C[m]0*  Pad Tag = first t bits of AES K (Checksum  Offset) return C[1]... C[m] || Tag

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 12 Assembly Speed Data from Helger Lipmaa OCB-AES 16.9 cpb (271 cycles) CBC-AES 15.9 cpb (255 cycles) ECB-AES 14.9 cpb (239 cycles) CBCMAC-AES 15.5 cpb (248 cycles) 6.5 % slower The above data is for 1 Kbyte messages. Code is pure Pentium 3 assembly. The block cipher is AES-128. Overhead so small that AES with a C-code CBC wrapper is slightly more expensive than AES with an assembly OCB wrapper. // Best Pentium AES code known. Helger’s code is for sale, btw.

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 13 C-Language Speed Data courtesy of Jesse Walker, Intel

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 14 Why I like OCB Ease-of-correct-use. Reasons: all-in-one approach; any type of nonce; parameterization limited to block cipher and tag length Aggressively optimized:  optimal in many dimensions: key length, ciphertext length, key setup time, encryption time, decryption time, available parallelism; SW characteristics; HW characteristics; … Simple but sophisticated Ideal setting for practice-oriented provable security

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 15 More on Provable Security Provable security begins with [Goldwasser, Micali 82] Despite the name, one doesn’t really prove security Instead, one gives reductions: theorems of the form If a certain primitive is secure then the scheme based on it is secure For us: If AES is a secure block cipher then OCB-AES is a secure authenticated-encryption scheme Equivalently: If some adversary A does a good job at breaking OCB-AES then some comparably efficient B does a good job to break AES Actual theorems quantitative: they measure how much security is “lost” across the reduction.

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 16 OCB Theorem Suppose there is an adversary A that breaks the privacy or the authenticity of OCB-E (where E is an n-bit block cipher) with: time = t total-number-of-blocks =  advantage =  Then there is an adversary B that breaks block cipher E with: time  t number-of-queries   advantage   – 1.5  2 / 2 n (Informal version) Breaking the privacy of OCB-E: The ability to distinguish OCB-E encrypted strings from random strings.. Breaking the authenticity of OCB-E: The ability to produce a forged ciphertext. Breaking the block cipher E: The ability to distinguish E K,E K -1 from ,  -1

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 17 What Provable Security Does, and Doesn’t, Buy You + Strong evidence that scheme does what was intended + Best assurance cryptographers know how to deliver + Quantitative usage guidance - An absolute guarantee - Protection from issues not captured by our abstractions - Protection from usage errors - Protection from implementation errors

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 18 Adoption Issues Scheme too new / might be wrong – Largely obviated by provable security Stability - OCB (Apr 1) has not and will not change. Good schemes last forever NIST does something else – If you care, send mail: Export - Non-issue due to EAR (b)(4) Licensing – Next slides

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 19 Do I have a Patent? I filed patent applications covering OCB (12 Oct 00, 9 Feb 01) I will license the resulting patent(s) under fair, reasonable, non-discriminatory terms Letter of Assurance provided to the IEEE (3 May 01) My commitment goes well beyond the IEEE policy: - Public pricing, public license agreement - One-time fee (paid-in-full license) - I am committed to making this simple and easy for everyone - For further info: see “Licensing” on the OCB web page

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 20 At present: No In the future: No way to know Do keep in mind the proviso from slide 2: I’m not a lawyer! Jutla / IBM Has patent filing before me, including IAPM IAPM resembles OCB. But there are major differences which would have made it difficult to make claims for IAPM that read against OCB My conclusion: IBM could come to hold a relevant patent, if their attorneys were lucky or insightful Does Anyone Else Have a Patent OCB Would Infringe Upon?

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 21 Does Anyone Else Have a Patent, cont. Gligor/VDG Has patent filings before me and IBM [GD, Aug 00] has an authenticated-encryption scheme, XCBC, but it does not resemble OCB I know of no idea from [GD] that I used in OCB My conclusion: I consider it unlikely that Gligor/VDG will come to hold a valid patent that reads against OCB My overall conclusion A company would be behaving with appropriate diligence to license from me - and no one else - at this time The IEEE would be behaving with appropriate diligence to request patent-assurance letters from IBM and VDG, just in case

doc.: IEEE /378 Submission July 2001 Phillip RogawaySlide 22 For More Information OCB web page  Contains FAQ, papers, reference code, assurance letter, licensing info... Feel free to call or send Upcoming talks: - NIST modes-of-operation workshop (Aug 24, Santa Barbara) - MIT TOC/Security seminar (Oct ??, Cambridge) - ACM CCS conference (Nov 5-8, Philadelphia) Grab me now or at CRYPTO (Aug 20-23) Anything Else ???