TEDT2-Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption

被引:4
作者
List, Eik [1 ]
机构
[1] Bauhaus Univ Weimar, Weimar, Germany
来源
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2021 | 2021年 / 12912卷
关键词
Symmetric-key cryptography; Authenticated encryption; Provable security; Leakage resilience; KEY; CONSTRUCTIONS; ISAP;
D O I
10.1007/978-3-030-88238-9_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Leakage-resilient authenticated encryption (AE) schemes received considerable attention during the previous decade. Two core security models of bounded and unbounded leakage have evolved, where the latter has been motivated in a very detailed and practice-oriented manner. In that setting, designers often build schemes based on (tweakable) block ciphers due to the small state size, such as the recent two-pass AE scheme TEDT from TCHES 1/2020. TEDT is interesting due to its high security guarantees of O(n-log(n(2)))-bit integrity under leakage and similar AE security in the black-box setting. Though, a detail limited it to provide only n/2-bit privacy under leakage. In this work, we extend TEDT to TEDT2 in three aspects with the help of a tweakable block cipher with a 3n-bit tweakey: we (1) adopt the idea from the design team of Romulus of replacing TEDT's previous internal hash function with Naito's MDPH, (2) move the nonce from the hash to the tag-generation function both for more efficiency, and (3) strengthen the security of the encryption to obtain beyond-birthday-bound security also under leakage.
引用
收藏
页码:275 / 295
页数:21
相关论文
共 47 条
[1]   Boosting Authenticated Encryption Robustness with Minimal Modifications [J].
Ashur, Tomer ;
Dunkelman, Orr ;
Luykx, Atul .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 :3-33
[2]   Authenticated Encryption in the Face of Protocol and Side Channel Leakage [J].
Barwell, Guy ;
Martin, Daniel P. ;
Oswald, Elisabeth ;
Stam, Martijn .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 :693-723
[3]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
[4]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[5]   Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography [J].
Bellizia, Davide ;
Bronchain, Olivier ;
Cassiers, Gaetan ;
Grosso, Vincent ;
Guo, Chun ;
Momin, Charles ;
Pereira, Olivier ;
Peters, Thomas ;
Standaert, Francois-Xavier .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 :369-400
[6]   Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher [J].
Bellizia, Davide ;
Berti, Francesco ;
Bronchain, Olivier ;
Cassiers, Gaetan ;
Duval, Sebastien ;
Guo, Chun ;
Leander, Gregor ;
Leurent, Gaetan ;
Levi, Itamar ;
Momin, Charles ;
Pereira, Olivier ;
Peters, Thomas ;
Standaert, Francois-Xavier ;
Udvarhelyi, Balazs ;
Wiemer, Friedrich .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 :295-349
[7]  
Berti F., 2016, IACR CRYPTOL EPRINT, V2016, P996
[8]  
Berti F, 2017, IACR T SYMMETRIC CRY, V2017, P271, DOI 10.13154/tosc.v2017.i3.271-293
[9]  
Berti Francesco., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, P256, DOI DOI 10.46586/TCHES.V2020.I1.256-320
[10]   SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security [J].
Cassiers, Gaetan ;
Guo, Chun ;
Pereira, Olivier ;
Peters, Thomas ;
Standaert, Francois-Xavier .
SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 :67-85