Authenticated Encryption with Variable Stretch

被引:12
|
作者
Reyhanitabar, Reza [1 ]
Vaudenay, Serge [2 ]
Vizar, Damian [2 ]
机构
[1] NEC Labs Europe, Heidelberg, Germany
[2] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I | 2016年 / 10031卷
关键词
Authenticated encryption; Variable length tags; Robustness; Security definitions; CAESAR competition;
D O I
10.1007/978-3-662-53887-6_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In conventional authenticated-encryption (AE) schemes, the ciphertext expansion, a.k.a. stretch or tag length, is a constant or a parameter of the scheme that must be fixed per key. However, using variable-length tags per key can be desirable in practice or may occur as a result of a misuse. The RAE definition by Hoang, Krovetz, and Rogaway (Eurocrypt 2015), aiming at the best-possible AE security, supports variable stretch among other strong features, but achieving the RAE goal incurs a particular inefficiency: neither encryption nor decryption can be online. The problem of enhancing the well-established nonce-based AE (nAE) model and the standard schemes thereof to support variable tag lengths per key, without sacrificing any desirable functional and efficiency properties such as online encryption, has recently regained interest as evidenced by extensive discussion threads on the CFRG forum and the CAESAR competition. Yet there is a lack of formal definition for this goal. First, we show that several recently proposed heuristic measures trying to augment the known schemes by inserting the tag length into the nonce and/or associated data fail to deliver any meaningful security in this setting. Second, we provide a formal definition for the notion of nonce-based variable-stretch AE (nvAE) as a natural extension to the traditional nAE model. Then, we proceed by showing a second modular approach to formalizing the goal by combining the nAE notion and a new property we call key-equivalent separation by stretch (kess). It is proved that (after a mild adjustment to the syntax) any nAE scheme which additionally fulfills the kess property will achieve the nvAE goal. Finally, we show that the nvAE goal is efficiently and provably achievable; for instance, by simple tweaks to off-the-shelf schemes such as OCB.
引用
收藏
页码:396 / 425
页数:30
相关论文
共 50 条
  • [41] Compactly Committing Authenticated Encryption Made Simpler
    Hirose, Shoichi
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (03) : 183 - 192
  • [42] ELmE: A Misuse Resistant Parallel Authenticated Encryption
    Datta, Nilanjan
    Nandi, Mridul
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 306 - 321
  • [43] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44
  • [44] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [45] On the security of generalization of threshold signature and authenticated encryption
    Tseng, YM
    Jan, JK
    Chien, HY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
  • [46] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263
  • [47] Attacks on the Authenticated Encryption Mode of Operation PAE
    Chakraborty, Debrup
    Nandi, Mridul
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (10) : 5636 - 5642
  • [48] Efficient authenticated encryption schemes with public verifiability
    Wang, GL
    Bao, F
    Ma, CS
    Chen, KF
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3258 - 3261
  • [49] Robust authenticated encryption scheme with message linkages
    Yoon, EJ
    Yoo, KY
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS, 2005, 3684 : 281 - 288
  • [50] TriviA: A Fast and Secure Authenticated Encryption Scheme
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 330 - 353