The COLM Authenticated Encryption Scheme

被引:2
|
作者
Andreeva, Elena [1 ]
Bogdanov, Andrey [2 ]
Datta, Nilanjan [3 ]
Luykx, Atul [4 ]
Mennink, Bart [5 ]
Nandi, Mridul [6 ]
Tischhauser, Elmar [2 ]
Yasuda, Kan [7 ]
机构
[1] TU Wien, Vienna, Austria
[2] Tech Univ Denmark, DTU Compute, Lyngby, Denmark
[3] TCG CREST, Inst Adv Intelligence, Kolkata, India
[4] Google, Mountain View, CA 94043 USA
[5] Radboud Univ Nijmegen, Digital Secur Grp, Nijmegen, Netherlands
[6] Indian Stat Inst, Kolkata, India
[7] NTT Secure Platform Labs, Tokyo, Japan
关键词
Symmetric authenticated encryption; CAESAR competition; Nonce misuse resistance; Defense in depth;
D O I
10.1007/s00145-024-09492-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the CAESAR competition. COLM realizes a nonce-based authenticated encryption with associated data and uses the popular AES blockcipher as its underlying primitive. We propose two possible blockcipher instantiations (with key of length 128 or 256 bits). We also define two COLM modes of operation variants: a primary COLM0\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_0$$\end{document} mode for general purpose applications, and a COLM tau\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_{\tau }$$\end{document} variant with intermediate tag generation/verification geared to support low-end devices and applications where frequent verification is required. COLM is designed with security, simplicity, and efficiency in mind. The main design goal of COLM is high security: a primary feature of the defense in depth CAESAR category. COLM provides security beyond the traditional AE security. First, COLM is secure against nonce misuse, namely, it enables security in adversarial settings where the nonce inputs to the AE scheme repeat. In contrast to standardized and popular AE algorithms, such as GCM and OCB1-3 modes, whose AE security trivially breaks down when the nonce is repeated, COLM ensures both confidentiality and authenticity (AE) security with repeated nonces. Second, our COLM tau\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_{\tau }$$\end{document} variant enables increased security levels in situations where release of unverified ciphertext (RUP) occurs due to its ability to limit a potential leakage by frequent verifications. In this work we prove COLM secure with respect to both confidentiality and authenticity (AE) security under nonce misuse in the well-known provable security framework. Our proofs show that COLM maintains n/2-bit security levels for block sizes of n bits. Furthermore, due to the inherent parallelism on both mode and primitive levels, our software performance results show that the price paid for enhanced security does come at the cost of minimal efficiency losses. More concretely, we implement GCM, COLM, and Deoxys-II on the Kaby Lake and Coffee lake Intel platforms. Compared to the other winner in the defense in depth category Deoxys-II, our AE design COLM0\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_0$$\end{document} performs 10-20% faster for the 128-bit key version. Regarding the 256-bit key versions COLM0\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_0$$\end{document} is around 5% faster for short and 2% slower than Deoxys-II for the longer messages.
引用
收藏
页数:32
相关论文
共 26 条
  • [1] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    Journal of Cryptology, 2024, 37
  • [2] Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM
    Ulusoy, Sirri Erdem
    Kara, Orhun
    Efe, Mehmet Onder
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [3] Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
    Agrawal, Megha
    Chang, Donghoon
    Kang, Jinkeon
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 22
  • [4] Toward a Fully Secure Authenticated Encryption Scheme from a Pseudorandom Permutation
    Choi, Wonseok
    Lee, Byeonghak
    Lee, Jooyoung
    Lee, Yeongmin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT III, 2021, 13092 : 407 - 434
  • [5] ZLR: a fast online authenticated encryption scheme achieving full security
    Choi, Wonseok
    Hwang, Seongha
    Lee, Byeonghak
    Lee, Jooyoung
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (10) : 3261 - 3316
  • [6] Authenticated Encryption with Variable Stretch
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizar, Damian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 396 - 425
  • [7] Authenticated Encryption Schemes: A Systematic Review
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 14739 - 14766
  • [8] Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
    Peyrin, Thomas
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 33 - 63
  • [9] General classification of the authenticated encryption schemes for the CAESAR competition
    Abed, Farzaneh
    Forler, Christian
    Lucks, Stefan
    COMPUTER SCIENCE REVIEW, 2016, 22 : 13 - 26
  • [10] Analysis of Sponge Function Based Authenticated Encryption Schemes
    Krishnan, Lekshmi R.
    Sindhu, M.
    Srinivasan, Chungath
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,