RIV for Robust Authenticated Encryption

被引:9
作者
Abed, Farzaneh [1 ]
Forler, Christian [2 ]
List, Eik [1 ]
Lucks, Stefan [1 ]
Wenzel, Jakob [1 ]
机构
[1] Bauhaus Univ Weimar, Weimar, Germany
[2] Hsch Schmalkalden, Schmalkalden, Germany
来源
FAST SOFTWARE ENCRYPTION (FSE 2016) | 2016年 / 9783卷
基金
欧洲研究理事会;
关键词
Robustness; Subtle authenticated encryption; Provable security; PSEUDORANDOM PERMUTATIONS; KEY; MODE;
D O I
10.1007/978-3-662-52993-5_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Typical AE schemes are supposed to be secure when used as specified. However, they can - and often do - fail miserably when used improperly. As a partial remedy, Rogaway and Shrimpton proposed (nonce-) misuse-resistant AE (MRAE) and the first MRAE scheme SIV ("Synthetic Initialization Vector"). This paper proposes RIV ("Robust Initialization Vector"), which extends the generic SIV construction by an additional call to the internal PRF. RIV inherits the full security assurance from SIV, but unlike SIV and other MRAE schemes, RIV is also provably secure when releasing unverified plaintexts. This follows a recent line of research on "Robust Authenticated Encryption", similar to the CAESAR candidate AEZ. An AES-based instantiation of RIV runs at less than 1.5 cpb on current x64 processors. Unlike the proposed instantiation of AEZ, which gains speed by relying on reduced-round AES, our instantiation of RIV is provably secure under the single assumption of the AES being secure.
引用
收藏
页码:23 / 42
页数:20
相关论文
共 51 条
[1]   Pipelineable On-line Encryption [J].
Abed, Farzaneh ;
Fluhrer, Scott ;
Forler, Christian ;
List, Eik ;
Lucks, Stefan ;
McGrew, David ;
Wenzel, Jakob .
FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 :205-223
[2]  
Anderson R., 1996, LNCS, V1039, P113, DOI DOI 10.1007/3-540-60865-6
[3]  
Andreeva E., 2014, PRIMATES
[4]  
Andreeva E, 2014, LECT NOTES COMPUT SC, V8873, P105, DOI 10.1007/978-3-662-45611-8_6
[5]  
[Anonymous], 2009, 197722009 ISOIEC
[6]  
Badertscher Christian, 2015, Cryptography and Coding. 15th IMA International Conference, IMACC 2015. Proceedings: LNCS 9496, P112, DOI 10.1007/978-3-319-27239-9_7
[7]  
Bahack L., 2014, JULIUS
[8]  
Barwell Guy, 2015, Cryptography and Coding. 15th IMA International Conference, IMACC 2015. Proceedings: LNCS 9496, P94, DOI 10.1007/978-3-319-27239-9_6
[9]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3017, P389
[10]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531