On the Security of Sponge-type Authenticated Encryption Modes

被引:9
|
作者
Chakraborty, Bishwajit [1 ]
Jha, Ashwin [1 ]
Nandi, Mridul [1 ]
机构
[1] Indian Stat Inst, Kolkata, India
关键词
Sponge; duplex; Beetle; SpoC; lightweight; AEAD; tight bound;
D O I
10.13154/tosc.v2020.i2.93-119
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. In fact, one can assess the popularity of this mode from the fact that around 25 out of the 56 round 1 submissions to the ongoing NIST lightweight cryptography (LwC) standardization process are based on this mode. Among these, 14 sponge-type constructions are selected for the second round consisting of 32 submissions. In this paper, we generalize the duplexing interface of the duplex mode, which we call Transform-then-Permute. It encompasses Beetle as well as a new sponge-type mode SpoC (both are round 2 submissions to NIST LwC). We show a tight security bound for Transform-then-Permute based on b-bit permutation, which reduces to finding an exact estimation of the expected number of multi-chains (defined in this paper). As a corollary of our general result, authenticated encryption advantage of Beetle and SpoC is about T(D+r2(r))/2(b) where T, D and r denotes the number of offline queries (related to time complexity of the attack), number of construction queries (related to data complexity) and rate of the construction (related to efficiency). Previously the same bound has been proved for Beetle under the limitation that T << min{2(r), 2(b/2)} (that compels to choose larger permutation with higher rate). In the context of NIST LwC requirement, SpoC based on 192-bit permutation achieves the desired security with 64-bit rate, which is not achieved by either duplex or Beetle (as per the previous analysis).
引用
收藏
页码:93 / 119
页数:27
相关论文
共 50 条
  • [31] Comments on the security of Chen's authenticated encryption scheme
    Rasslan, Mohamed
    Youssef, Amr
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (01) : 71 - 74
  • [32] Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
    Shenets, N. N.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 857 - 864
  • [33] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [34] Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
    Andreeva, Elena
    Bhati, Amit Singh
    Vizar, Damian
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 512 - 534
  • [35] Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
    N. N. Shenets
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 857 - 864
  • [36] A Security Framework for NoC Using Authenticated Encryption and Session Keys
    Hemangee K. Kapoor
    G. Bhoopal Rao
    Sharique Arshi
    Gaurav Trivedi
    [J]. Circuits, Systems, and Signal Processing, 2013, 32 : 2605 - 2622
  • [37] Compression with Authenticated Encryption for Enhanced Security on Data Centric Products
    Tiwari, Neha
    Keshavamurthy, Bettahally N.
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1596 - 1600
  • [38] On the Related-Key Attack Security of Authenticated Encryption Schemes
    Faust, Sebastian
    Kraemer, Juliane
    Orlt, Maximilian
    Struck, Patrick
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 362 - 386
  • [39] A Security Framework for NoC Using Authenticated Encryption and Session Keys
    Kapoor, Hemangee K.
    Rao, G. Bhoopal
    Arshi, Sharique
    Trivedi, Gaurav
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2013, 32 (06) : 2605 - 2622
  • [40] Compressive Sensing Encryption Modes and their Security
    Fay, Robin
    Ruland, Christoph
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 119 - 126