Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

被引:60
|
作者
Peyrin, Thomas [1 ]
Seurin, Yannick [2 ]
机构
[1] Nanyang Technol Univ, SPMS, Singapore, Singapore
[2] ANSSI, Paris, France
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I | 2016年 / 9814卷
基金
新加坡国家研究基金会;
关键词
Authenticated encryption; Tweakable block cipher; Nonce-misuse resistance; Beyond-birthday-bound security; CAESAR competition; SECURITY TREATMENT; BLOCKCIPHERS; PERFORMANCE; OPERATION; NOTIONS;
D O I
10.1007/978-3-662-53018-4_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a nonce-based authenticated encryption scheme (with associated data). The SCT mode combines in a SIV-like manner a Wegman-Carter MAC inspired from PMAC for the authentication part and a new counter-like mode for the encryption part, with the unusual property that the counter is applied on the tweak input of the underlying tweakable block cipher rather than on the plaintext input. Unlike many previous authenticated encryption modes, SCT enjoys provable security beyond the birthday bound (and even up to roughly 2 n tweakable block cipher calls, where n is the block length, when the tweak length is sufficiently large) in the nonce-respecting scenario where nonces are never repeated. In addition, SCT ensures security up to the birthday bound even when nonces are reused, in the strong nonce-misuse resistance sense (MRAE) of Rogaway and Shrimpton (EUROCRYPT 2006). To the best of our knowledge, this is the first authenticated encryption mode that provides at the same time close-tooptimal security in the nonce-respecting scenario and birthday-bound security for the nonce-misuse scenario. While two passes are necessary to achieve MRAE-security, our mode enjoys a number of desirable features: it is simple, parallelizable, it requires the encryption direction only, it is particularly efficient for small messages compared to other noncemisuse resistant schemes (no precomputation is required) and it allows incremental update of associated data.
引用
收藏
页码:33 / 63
页数:31
相关论文
共 50 条
  • [41] Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON-Galois/Counter Mode
    Cheng, Xin
    Xu, Yixuan
    Wang, Kefan
    Zhang, Yongqiang
    Li, Bin
    Zhang, Zhang
    INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2023, 51 (12) : 5951 - 5961
  • [42] Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes
    Al Mahri, Hassan Qahur
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Wong, Kenneth Koon-Ho
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 285 - 305
  • [43] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Philipp Jovanovic
    Atul Luykx
    Bart Mennink
    Yu Sasaki
    Kan Yasuda
    Journal of Cryptology, 2019, 32 : 895 - 940
  • [44] A Lightweight Authenticated Encryption Algorithm Based on Compact CLEFIA Block Cipher
    Liang, Meiyu
    Ji, Tao
    Yuan, Yin
    Cheng, Xin
    Zhang, Zhang
    Ma, Lixiang
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2025,
  • [45] The offset codebook (OCB) block cipher mode of operation for authenticated encryption
    Stallings, William
    CRYPTOLOGIA, 2018, 42 (02) : 135 - 145
  • [46] Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
    Goudarzi, Dahmun
    Jean, Jeremy
    Kolbl, Stefan
    Peyrin, Thomas
    Rivain, Matthieu
    Sasaki, Yu
    Sim, Siang Meng
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 31 - 59
  • [47] Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC
    Ma, Zhangjun
    Li, Manman
    Chen, Shaozhen
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (09)
  • [48] INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes
    Chakraborti, Avik
    Datta, Nilanjan
    Nandi, Mridul
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 39 - 54
  • [49] Terabit encryption in a second: Performance evaluation of block ciphers in GPU with Kepler, Maxwell, and Pascal architectures
    Lee, Wai-Kong
    Goi, Bok-Min
    Phan, Raphael C-W
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (11):
  • [50] Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption
    Shimizu, Toshiya
    Shimoyama, Takeshi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 256 - 275