Revisiting the Security of COMET Authenticated Encryption Scheme

被引:0
作者
Gueron, Shay [1 ,2 ]
Jha, Ashwin [3 ]
Nandi, Mridul [4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Amazon Web Serv, Seattle, WA USA
[3] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[4] Indian Stat Inst, Kolkata, India
来源
PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021 | 2021年 / 13143卷
基金
以色列科学基金会;
关键词
COMET; ICM; Provable security; Rekeying; Lightweight; AEAD;
D O I
10.1007/978-3-030-92518-5_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
COMETv1, by Gueron, Jha and Nandi, is a mode of operation for nonce-based authenticated encryption with associated data functionality. It was one of the second round candidates in the ongoing NIST Lightweight Cryptography Standardization Process. In this paper, we study a generalized version of COMETv1, that we call gCOMET, from provable security perspective. First, we present a comprehensive and complete security proof for gCOMET in the ideal cipher model. Second, we view COMET, the underlying mode of operation in COMETv1, as an instantiation of gCOMET, and derive its concrete security bounds. Finally, we propose another instantiation of gCOMET, dubbed COMETv2, and show that this version achieves better security guarantees as well as memory-efficient implementations as compared to COMETv1.
引用
收藏
页码:3 / 25
页数:23
相关论文
共 50 条
  • [31] Authenticated encryption: how reordering can impact performance
    Alomair, Basel
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6173 - 6188
  • [32] Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 705 - 735
  • [33] Quantum circuit implementations of lightweight authenticated encryption ASCON
    Zheng, Yuanmeng
    Luo, Qingbin
    Li, Qiang
    Lv, Yi
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (08) : 11322 - 11337
  • [34] ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
    Chakraborti, Avik
    Datta, Nilanjan
    Jha, Ashwin
    Mancillas-Lopez, Cuauhtemoc
    Nandi, Mridul
    Sasaki, Yu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 350 - 389
  • [35] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 257 - 276
  • [36] Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
    CHEN Yu
    CHEN LiQun
    LIN DongDai
    Science China(Mathematics), 2013, 56 (07) : 1385 - 1401
  • [37] Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
    Yu Chen
    LiQun Chen
    DongDai Lin
    Science China Mathematics, 2013, 56 : 1385 - 1401
  • [38] An attribute-based anonymous broadcast encryption scheme with adaptive security in the standard model
    Rabaninejad, R.
    Ameri, M. H.
    Delavar, M.
    Mohajeri, J.
    SCIENTIA IRANICA, 2019, 26 (03) : 1700 - 1713
  • [39] Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
    Chen Yu
    Chen LiQun
    Lin DongDai
    SCIENCE CHINA-MATHEMATICS, 2013, 56 (07) : 1385 - 1401
  • [40] Security and Privacy Analysis of Vinoth et al.'s Authenticated Key Agreement Scheme for Industrial IoT
    Sun, Da-Zhi
    SYMMETRY-BASEL, 2021, 13 (10):