EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC

被引:54
作者
Cogliati, Benoit [1 ]
Seurin, Yannick [2 ]
机构
[1] Univ Versailles, Versailles, France
[2] ANSSI, Paris, France
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I | 2016年 / 9814卷
关键词
Wegman-Carter MAC; Davies-Meyer construction; Nonce-misuse resistance; Beyond-birthday-bound security; MESSAGE-AUTHENTICATION; CBC MACS; PERFORMANCE; ENCRYPTION; ATTACKS; BOUNDS; SUM;
D O I
10.1007/978-3-662-53018-4_5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a nonce-based MAC construction called EWCDM (Encrypted Wegman-Carter with Davies-Meyer), based on an almost xoruniversal hash function and a block cipher, with the following properties: (i) it is simple and efficient, requiring only two calls to the block cipher, one of which can be carried out in parallel to the hash function computation; (ii) it is provably secure beyond the birthday bound when nonces are not reused; (iii) it provably retains security up to the birthday bound in case of nonce misuse. Our construction is a simple modification of the Encrypted Wegman-Carter construction, which is known to achieve only (i) and (iii) when based on a block cipher. Underlying our new construction is a new PRP-to-PRF conversion method coined Encrypted Davies-Meyer, which turns a pair of secret random permutations into a function which is provably indistinguishable from a perfectly random function up to at least 2(2n)/3 queries, where n is the bit-length of the domain of the permutations.
引用
收藏
页码:121 / 149
页数:29
相关论文
共 50 条
[11]  
Bernstein D.J, 2005, STRONGER SECUR UNPUB
[12]  
Bernstein D.J, 2007, POLYNOMIAL EVA UNPUB
[13]  
Bernstein DJ, 2005, LECT NOTES COMPUT SC, V3557, P32
[14]  
Bernstein DJ, 2005, LECT NOTES COMPUT SC, V3494, P164
[15]  
Black J., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P216, DOI 10.1007/3-540-48405-1_14
[16]  
Black J, 2005, J CRYPTOL, V18, P111, DOI [10.1007/s00145-004-0016-3, 10.1007/S00145-004-0016-3]
[17]  
Black J, 2009, LECT NOTES COMPUT SC, V5665, P345, DOI 10.1007/978-3-642-03317-9_21
[18]  
Brassard Gilles, 1982, ADV CRYPTOLOGY, P79
[19]  
Chen S, 2014, LECT NOTES COMPUT SC, V8616, P39, DOI 10.1007/978-3-662-44371-2_3
[20]  
Chen S, 2014, LECT NOTES COMPUT SC, V8441, P327, DOI 10.1007/978-3-642-55220-5_19