On the Security of Sponge-type Authenticated Encryption Modes

被引:9
|
作者
Chakraborty, Bishwajit [1 ]
Jha, Ashwin [1 ]
Nandi, Mridul [1 ]
机构
[1] Indian Stat Inst, Kolkata, India
关键词
Sponge; duplex; Beetle; SpoC; lightweight; AEAD; tight bound;
D O I
10.13154/tosc.v2020.i2.93-119
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. In fact, one can assess the popularity of this mode from the fact that around 25 out of the 56 round 1 submissions to the ongoing NIST lightweight cryptography (LwC) standardization process are based on this mode. Among these, 14 sponge-type constructions are selected for the second round consisting of 32 submissions. In this paper, we generalize the duplexing interface of the duplex mode, which we call Transform-then-Permute. It encompasses Beetle as well as a new sponge-type mode SpoC (both are round 2 submissions to NIST LwC). We show a tight security bound for Transform-then-Permute based on b-bit permutation, which reduces to finding an exact estimation of the expected number of multi-chains (defined in this paper). As a corollary of our general result, authenticated encryption advantage of Beetle and SpoC is about T(D+r2(r))/2(b) where T, D and r denotes the number of offline queries (related to time complexity of the attack), number of construction queries (related to data complexity) and rate of the construction (related to efficiency). Previously the same bound has been proved for Beetle under the limitation that T << min{2(r), 2(b/2)} (that compels to choose larger permutation with higher rate). In the context of NIST LwC requirement, SpoC based on 192-bit permutation achieves the desired security with 64-bit rate, which is not achieved by either duplex or Beetle (as per the previous analysis).
引用
收藏
页码:93 / 119
页数:27
相关论文
共 50 条
  • [1] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Philipp Jovanovic
    Atul Luykx
    Bart Mennink
    Yu Sasaki
    Kan Yasuda
    [J]. Journal of Cryptology, 2019, 32 : 895 - 940
  • [2] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    Sasaki, Yu
    Yasuda, Kan
    [J]. JOURNAL OF CRYPTOLOGY, 2019, 32 (03) : 895 - 940
  • [3] Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 85 - 104
  • [4] Sponge-Based Authenticated Encryption: Security Against Quantum Attackers
    Janson, Christian
    Struck, Patrick
    [J]. POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 230 - 259
  • [5] Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
    Mennink, Bart
    Reyhanitabar, Reza
    Vizar, Damian
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 465 - 489
  • [6] DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION
    Hammad, Baraa Tariq
    Jamil, Norziana
    Rusli, Mohd Ezanee
    Zaba, Muhammad Reza
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING, 2017, : 714 - 721
  • [7] On the security of a convertible authenticated encryption
    Zhang, JH
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1063 - 1069
  • [8] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [9] PARTITIONING OF SPHERICAL SOLUTES INTO SPONGE-TYPE MATERIALS
    FANTI, LA
    GLANDT, ED
    [J]. AICHE JOURNAL, 1989, 35 (11) : 1883 - 1893
  • [10] Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
    Bhargavi, K. V. L.
    Srinivasan, Chungath
    Lakshmy, K., V
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 49 - 70