Revisiting the Security of COMET Authenticated Encryption Scheme

被引:0
作者
Gueron, Shay [1 ,2 ]
Jha, Ashwin [3 ]
Nandi, Mridul [4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Amazon Web Serv, Seattle, WA USA
[3] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[4] Indian Stat Inst, Kolkata, India
来源
PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021 | 2021年 / 13143卷
基金
以色列科学基金会;
关键词
COMET; ICM; Provable security; Rekeying; Lightweight; AEAD;
D O I
10.1007/978-3-030-92518-5_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
COMETv1, by Gueron, Jha and Nandi, is a mode of operation for nonce-based authenticated encryption with associated data functionality. It was one of the second round candidates in the ongoing NIST Lightweight Cryptography Standardization Process. In this paper, we study a generalized version of COMETv1, that we call gCOMET, from provable security perspective. First, we present a comprehensive and complete security proof for gCOMET in the ideal cipher model. Second, we view COMET, the underlying mode of operation in COMETv1, as an instantiation of gCOMET, and derive its concrete security bounds. Finally, we propose another instantiation of gCOMET, dubbed COMETv2, and show that this version achieves better security guarantees as well as memory-efficient implementations as compared to COMETv1.
引用
收藏
页码:3 / 25
页数:23
相关论文
共 50 条
  • [41] SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
    Banik, Subhadeep
    Bogdanov, Audrey
    Luykx, Atul
    Tischhauser, Elmar
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (03) : 1 - 35
  • [42] A Survey on Authenticated Encryption-ASIC Designer's Perspective
    Kavun, Elif Bilge
    Mihajloska, Hristina
    Yalcin, Tolga
    [J]. ACM COMPUTING SURVEYS, 2018, 50 (06)
  • [43] Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages
    Andreeva, Elena
    Lallemand, Virginie
    Purnal, Antoon
    Reyhanitabar, Reza
    Roy, Arnab
    Vizar, Damian
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 : 153 - 182
  • [44] Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus
    Beyne, Tim
    Chen, Yu Long
    Dobraunig, Christoph
    Mennink, Bart
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 5 - 30
  • [45] Scalable and Efficient Hardware Architectures for Authenticated Encryption in IoT Applications
    Khan, Safiullah
    Lee, Wai-Kong
    Hwang, Seong Oun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (14) : 11260 - 11275
  • [46] Patent-free authenticated-encryption as fast as OCB
    Krovetz, Ted
    [J]. INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 459 - +
  • [47] ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model
    Agrawal, Shashank
    Dai, Wei
    Luykx, Atul
    Mukherjee, Pratyay
    Rindal, Peter
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 26 - 51
  • [48] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    [J]. FrontiersofInformationTechnology&ElectronicEngineering, 2018, 19 (04) : 481 - 493
  • [49] Aleakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei Zhou
    Bo Yang
    Hao Cheng
    Qing-long Wang
    [J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 481 - 493
  • [50] Aleakage-resilient certificateless public key encryption scheme with CCA2 security
    Zhou, Yan-wei
    Yang, Bo
    Cheng, Hao
    Wang, Qing-long
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (04) : 481 - 493