Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

被引:58
|
作者
Peyrin, Thomas [1 ]
Seurin, Yannick [2 ]
机构
[1] Nanyang Technol Univ, SPMS, Singapore, Singapore
[2] ANSSI, Paris, France
基金
新加坡国家研究基金会;
关键词
Authenticated encryption; Tweakable block cipher; Nonce-misuse resistance; Beyond-birthday-bound security; CAESAR competition; SECURITY TREATMENT; BLOCKCIPHERS; PERFORMANCE; OPERATION; NOTIONS;
D O I
10.1007/978-3-662-53018-4_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable block cipher into a nonce-based authenticated encryption scheme (with associated data). The SCT mode combines in a SIV-like manner a Wegman-Carter MAC inspired from PMAC for the authentication part and a new counter-like mode for the encryption part, with the unusual property that the counter is applied on the tweak input of the underlying tweakable block cipher rather than on the plaintext input. Unlike many previous authenticated encryption modes, SCT enjoys provable security beyond the birthday bound (and even up to roughly 2 n tweakable block cipher calls, where n is the block length, when the tweak length is sufficiently large) in the nonce-respecting scenario where nonces are never repeated. In addition, SCT ensures security up to the birthday bound even when nonces are reused, in the strong nonce-misuse resistance sense (MRAE) of Rogaway and Shrimpton (EUROCRYPT 2006). To the best of our knowledge, this is the first authenticated encryption mode that provides at the same time close-tooptimal security in the nonce-respecting scenario and birthday-bound security for the nonce-misuse scenario. While two passes are necessary to achieve MRAE-security, our mode enjoys a number of desirable features: it is simple, parallelizable, it requires the encryption direction only, it is particularly efficient for small messages compared to other noncemisuse resistant schemes (no precomputation is required) and it allows incremental update of associated data.
引用
收藏
页码:33 / 63
页数:31
相关论文
共 50 条
  • [1] Lightweight authenticated encryption mode of operation for tweakable block ciphers
    Naito, Yusuke
    Sugawara, Takeshi
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (01): : 66 - 94
  • [2] Tweakable SM4: How to tweak SM4 into tweakable block ciphers?
    Guo, Zhenzhen
    Wang, Gaoli
    Dunkelman, Orr
    Pan, Yinxue
    Liu, Shengyuan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [3] Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
    Shen, Yaobin
    Standaert, Francois-Xavier
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (02) : 47 - 68
  • [4] Tweakable Block Ciphers
    Liskov, Moses
    Rivest, Ronald L.
    Wagner, David
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (03) : 588 - 613
  • [5] Tweakable Block Ciphers
    Moses Liskov
    Ronald L. Rivest
    David Wagner
    [J]. Journal of Cryptology, 2011, 24 : 588 - 613
  • [6] Tweakable block ciphers
    Liskov, M
    Rivest, RL
    Wagner, D
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 31 - 46
  • [7] Compactly Committing Authenticated Encryption Using Tweakable Block Cipher
    Hirose, Shoichi
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 187 - 206
  • [8] ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
    Bao, Zhenzhen
    Guo, Jian
    Iwata, Tetsu
    Minematsu, Kazuhiko
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (02) : 1 - 54
  • [9] A general construction of tweakable block ciphers and different modes of operations
    Chakraborty, Debrup
    Sarkar, Palash
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (05) : 1991 - 2006
  • [10] A general construction of tweakable block ciphers and different modes of operations
    Chakraborty, Debrup
    Sarkar, Palash
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 88 - 102