Revisiting the Security of COMET Authenticated Encryption Scheme

被引:0
作者
Gueron, Shay [1 ,2 ]
Jha, Ashwin [3 ]
Nandi, Mridul [4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Amazon Web Serv, Seattle, WA USA
[3] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[4] Indian Stat Inst, Kolkata, India
来源
PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021 | 2021年 / 13143卷
基金
以色列科学基金会;
关键词
COMET; ICM; Provable security; Rekeying; Lightweight; AEAD;
D O I
10.1007/978-3-030-92518-5_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
COMETv1, by Gueron, Jha and Nandi, is a mode of operation for nonce-based authenticated encryption with associated data functionality. It was one of the second round candidates in the ongoing NIST Lightweight Cryptography Standardization Process. In this paper, we study a generalized version of COMETv1, that we call gCOMET, from provable security perspective. First, we present a comprehensive and complete security proof for gCOMET in the ideal cipher model. Second, we view COMET, the underlying mode of operation in COMETv1, as an instantiation of gCOMET, and derive its concrete security bounds. Finally, we propose another instantiation of gCOMET, dubbed COMETv2, and show that this version achieves better security guarantees as well as memory-efficient implementations as compared to COMETv1.
引用
收藏
页码:3 / 25
页数:23
相关论文
共 50 条
  • [21] Observations on the Security of COMET
    Xu, Zheng
    Li, Yongqiang
    Wang, Mingsheng
    COMPUTER JOURNAL, 2022, 65 (09) : 2247 - 2261
  • [22] Artemia: A Family of Provably Secure Authenticated Encryption Schemes
    Alizadeh, Javad
    Aref, Mohammad Reza
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 125 - 139
  • [23] Integrity analysis of authenticated encryption based on stream ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) : 493 - 511
  • [24] Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
    Granger, Robert
    Jovanovic, Philipp
    Mennink, Bart
    Neves, Samuel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 263 - 293
  • [25] OMD: A Compression Function Mode of Operation for Authenticated Encryption
    Cogliani, Simon
    Maimut, Diana-Stefania
    Naccache, David
    do Canto, Rodrigo Portella
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizar, Damian
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 112 - 128
  • [26] QCB: Efficient Quantum-Secure Authenticated Encryption
    Bhaumik, Ritam
    Bonnetain, Xavier
    Chailloux, Andre
    Leurent, Gaetan
    Naya-Plasencia, Maria
    Schrottenloher, Andre
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 668 - 698
  • [27] Authenticated Encryption in the Face of Protocol and Side Channel Leakage
    Barwell, Guy
    Martin, Daniel P.
    Oswald, Elisabeth
    Stam, Martijn
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 693 - 723
  • [28] Low Cost Implementation of Authenticated Encryption Using Spongift
    Parthasarathy, R.
    Saravanan, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (04) : 2479 - 2493
  • [29] Quantum circuit implementations of lightweight authenticated encryption ASCON
    Yuanmeng Zheng
    Qingbin Luo
    Qiang Li
    Yi Lv
    The Journal of Supercomputing, 2024, 80 : 11322 - 11337
  • [30] Integrity analysis of authenticated encryption based on stream ciphers
    Kazuya Imamura
    Kazuhiko Minematsu
    Tetsu Iwata
    International Journal of Information Security, 2018, 17 : 493 - 511