EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC

被引:54
作者
Cogliati, Benoit [1 ]
Seurin, Yannick [2 ]
机构
[1] Univ Versailles, Versailles, France
[2] ANSSI, Paris, France
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I | 2016年 / 9814卷
关键词
Wegman-Carter MAC; Davies-Meyer construction; Nonce-misuse resistance; Beyond-birthday-bound security; MESSAGE-AUTHENTICATION; CBC MACS; PERFORMANCE; ENCRYPTION; ATTACKS; BOUNDS; SUM;
D O I
10.1007/978-3-662-53018-4_5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a nonce-based MAC construction called EWCDM (Encrypted Wegman-Carter with Davies-Meyer), based on an almost xoruniversal hash function and a block cipher, with the following properties: (i) it is simple and efficient, requiring only two calls to the block cipher, one of which can be carried out in parallel to the hash function computation; (ii) it is provably secure beyond the birthday bound when nonces are not reused; (iii) it provably retains security up to the birthday bound in case of nonce misuse. Our construction is a simple modification of the Encrypted Wegman-Carter construction, which is known to achieve only (i) and (iii) when based on a block cipher. Underlying our new construction is a new PRP-to-PRF conversion method coined Encrypted Davies-Meyer, which turns a pair of secret random permutations into a function which is provably indistinguishable from a perfectly random function up to at least 2(2n)/3 queries, where n is the bit-length of the domain of the permutations.
引用
收藏
页码:121 / 149
页数:29
相关论文
共 50 条
[1]   Twisted Polynomials and Forgery Attacks on GCM [J].
Abdelraheem, Mohamed Ahmed ;
Beelen, Peter ;
Bogdanov, Andrey ;
Tischhauser, Elmar .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :762-786
[2]  
Bellare M, 2005, LECT NOTES COMPUT SC, V3621, P527
[3]  
Bellare M, 1998, LECT NOTES COMPUT SC, V1403, P266, DOI 10.1007/BFb0054132
[4]  
Bellare M., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P270
[5]   The security of the cipher block chaining message authentication code [J].
Bellare, M ;
Kilian, J ;
Rogaway, P .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) :362-399
[6]  
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[7]  
Bellare M., 2004, IACR CRYPTOLOGY EPRI, V2004, P309
[8]  
Bellare M., 1999, 1999024 IACR
[9]  
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409
[10]  
Bernstein D., 2000, Floating-point arithmetic and message authentication