Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC

被引:28
|
作者
Datta, Nilanjan [1 ]
Dutta, Avijit [2 ]
Nandi, Mridul [2 ]
Yasuda, Kan [3 ]
机构
[1] Indian Inst Technol, Kharagpur, W Bengal, India
[2] Indian Stat Inst, Kolkata, India
[3] NTT Corp, NTT Secure Platform Labs, Tokyo, Japan
来源
关键词
EDM; EWCDM; Mirror theory; Extended mirror theory; H-Coefficient;
D O I
10.1007/978-3-319-96884-1_21
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
At CRYPTO 2016, Cogliati and Seurin have proposed a highly secure nonce-based MAC called Encrypted Wegman-Carter with Davies-Meyer (EWCDM) construction, as E-K2(E-K1(N) circle plus N circle plus H-Kh (M)) for a nonce N and a message M. This construction achieves roughly 2(2n/3) bit MAC security with the assumption that E is a PRP secure n-bit block cipher and H is an almost xor universal n-bit hash function. In this paper we propose Decrypted Wegman-Carter with Davies-Meyer (DWCDM) construction, which is structurally very similar to its predecessor EWCDM except that the outer encryption call is replaced by decryption. The biggest advantage of DWCDM is that we can make a truly single key MAC: the two block cipher calls can use the same block cipher key K = K-1 = K-2. Moreover, we can derive the hash key as K-h = E-K(1), as long as vertical bar K-h vertical bar = n. Whether we use encryption or decryption in the outer layer makes a huge difference; using the decryption instead enables us to apply an extended version of the mirror theory by Patarin to the security analysis of the construction. DWCDM is secure beyond the birthday bound, roughly up to 2(2n/3) MAC queries and 2(n) verification queries against nonce-respecting adversaries. DWCDM remains secure up to 2(n/2) MAC queries and 2(n) verification queries against noncemisusing adversaries.
引用
收藏
页码:631 / 661
页数:31
相关论文
共 3 条
  • [1] Beyond Birthday Bound Secure MAC in Faulty Nonce Model
    Dutta, Avijit
    Nandi, Mridul
    Talnikar, Suprita
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 : 437 - 466
  • [2] EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
    Cogliati, Benoit
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 121 - 149
  • [3] One-Key Compression Function Based MAC with Security Beyond Birthday Bound
    Dutta, Avijit
    Nandi, Mridul
    Paul, Goutam
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 343 - 358