How to Securely Release Unverified Plaintext in Authenticated Encryption

被引:0
|
作者
Andreeva, Elena [1 ,2 ]
Bogdanov, Andrey [3 ]
Luykx, Atul [1 ,2 ]
Mennink, Bart [1 ,2 ]
Mouha, Nicky [1 ,2 ]
Yasuda, Kan [1 ,4 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC, Dept Elect Engn, Louvain, Belgium
[2] iMinds, Louvain, Belgium
[3] Tech Univ Denmark, Dept Math, Odense, Denmark
[4] NTT Secure Platform Labs, Tokyo, Japan
关键词
SECURITY TREATMENT; SINGLE-KEY; MODE; CBC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Scenarios in which authenticated encryption schemes output decrypted plaintext before successful verification raise many security issues. These situations are sometimes unavoidable in practice, such as when devices have insufficient memory to store an entire plaintext, or when a decrypted plaintext needs early processing due to real-time requirements. We introduce the first formalization of the releasing unverified plaintext (RUP) setting. To achieve privacy, we propose using plaintext awareness (PA) along with IND-CPA. An authenticated encryption scheme is PA if it has a plaintext extractor, which tries to fool adversaries by mimicking the decryption oracle, without the secret key. Releasing unverified plaintext to the attacker then becomes harmless as it is infeasible to distinguish the decryption oracle from the plaintext extractor. We introduce two notions of plaintext awareness in the symmetric-key setting, PA1 and PA2, and show that they expose a new layer of security between IND-CPA and IND-CCA. To achieve integrity, INT-CTXT in the RUP setting is required, which we refer to as INT-RUP. These new security notions are compared with conventional definitions, and are used to make a classification of symmetric-key schemes in the RUP setting. Furthermore, we re-analyze existing authenticated encryption schemes, and provide solutions to fix insecure schemes.
引用
收藏
页码:105 / 125
页数:21
相关论文
共 50 条
  • [1] Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
    Chang, Donghoon
    Datta, Nilanjan
    Dutta, Avijit
    Mennink, Bart
    Nandi, Mridul
    Sanadhya, Somitra
    Sibleyras, Ferdinand
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 119 - 146
  • [2] Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM
    Ulusoy, Sirri Erdem
    Kara, Orhun
    Efe, Mehmet Onder
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [3] Authenticated encryption: how reordering can impact performance
    Alomair, Basel
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6173 - 6188
  • [4] Plaintext-Checkable Encryption
    Canard, Sebastien
    Fuchsbauer, Georg
    Gouget, Aline
    Laguillaumie, Fabien
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 332 - +
  • [5] Multiwavelength securely-authenticated broadcast network
    Nishikido, J
    Hiramatsu, A
    Ogawara, M
    Tsukada, M
    Yukimatsu, K
    [J]. IOOC-ECOC 97 - 11TH INTERNATIONAL CONFERENCE ON INTEGRATED OPTICS AND OPTICAL FIBRE COMMUNICATIONS / 23RD EUROPEAN CONFERENCE ON OPTICAL COMMUNICATIONS, VOL 4, 1997, (448): : 17 - 20
  • [6] How to Abuse and Fix Authenticated Encryption Without Key Commitment
    Albertini, Ange
    Thai Duong
    Gueron, Shay
    Kolbl, Stefan
    Luykx, Atul
    Schmieg, Sophie
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3291 - 3308
  • [7] The ring authenticated encryption scheme - How to provide a clue wisely
    Lv, Jiqiang
    Ren, Kui
    Chen, Xiaofeng
    Ki, Kwangjo
    [J]. INFORMATION SCIENCES, 2009, 179 (1-2) : 161 - 168
  • [8] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [9] PLAINTEXT CHECKABLE ENCRYPTION WITH DESIGNATED CHECKER
    Das, Angsuman
    Adhikari, Avishek
    Sakurai, Kouichi
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2015, 9 (01) : 37 - 53
  • [10] Securely obfuscating re-encryption
    Hohenberger, Susan
    Rothblum, Guy N.
    shelat, abhi
    Vaikuntanathan, Vinod
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 233 - +