Integrity analysis of authenticated encryption based on stream ciphers

被引:5
|
作者
Imamura, Kazuya [1 ]
Minematsu, Kazuhiko [2 ]
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Nagoya, Aichi, Japan
[2] NEC Corp Ltd, Tokyo, Japan
关键词
Authenticated encryption; Stream cipher; Universal hash function; Provable security; Integrity; Releasing unverified plaintext; SECURITY; CODE; OPERATION; MODE;
D O I
10.1007/s10207-017-0378-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the security of authenticated encryption based on a stream cipher and a universal hash function. We consider ChaCha20-Poly1305 and generic constructions proposed by Sarkar, where the generic constructions include 14 AEAD (authenticated encryption with associated data) schemes and 3 DAEAD (deterministic AEAD) schemes. In this paper, we analyze the integrity of these schemes both in the standard INT-CTXT (integrity of ciphertext) notion and in the RUP (releasing unverified plaintext) setting called INT-RUP notion. We present INT-CTXT attacks against 3 out of the 14 AEAD schemes and 1 out of the 3 DAEAD schemes. We then show INT-RUP attacks against 1 out of the 14 AEAD schemes and the 2 remaining DAEAD schemes. Next, we consider ChaCha20-Poly1305 and show that it is provably secure in the INT-RUP notion. Finally, we show that the remaining 10 AEAD schemes are provably secure in the INT-RUP notion.
引用
收藏
页码:493 / 511
页数:19
相关论文
共 50 条
  • [1] Integrity analysis of authenticated encryption based on stream ciphers
    Kazuya Imamura
    Kazuhiko Minematsu
    Tetsu Iwata
    International Journal of Information Security, 2018, 17 : 493 - 511
  • [2] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 257 - 276
  • [3] Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
    He, Yu
    Wang, Gaoli
    Li, Wenshan
    Ren, Yizhi
    IEEE ACCESS, 2020, 8 : 20920 - 20930
  • [4] Accelerated Software Implementation of Authenticated Encryption Stream Ciphers for High Speed Applications
    Taha, Sara
    Mostafa, Hassan
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 27 - 31
  • [5] Authenticated Encryption in WSN Using eSTREAM Ciphers
    Ahmad, Shakil
    Wahla, Arif
    Kausar, Firdous
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 741 - 749
  • [6] StrongBox: Conidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption
    Dickens, Bernard, III
    Gunawi, Haryadi S.
    Feldman, Ariel J.
    Hofmann, Henry
    ACM SIGPLAN NOTICES, 2018, 53 (02) : 708 - 721
  • [7] Lightweight authenticated encryption mode of operation for tweakable block ciphers
    Naito, Yusuke
    Sugawara, Takeshi
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (01): : 66 - 94
  • [8] Stream vs block ciphers for scan encryption
    Valea, Emanuele
    Da Silva, Mathieu
    Flottes, Marie-Lise
    Di Natale, Giorgio
    Rouzeyre, Bruno
    MICROELECTRONICS JOURNAL, 2019, 86 : 65 - 76
  • [9] Physical-Layer Encryption with Stream Ciphers
    Zuquete, Andre
    Barros, Joao
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 106 - +
  • [10] Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
    Peyrin, Thomas
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 33 - 63