Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes

被引:0
|
作者
Jovanovic, Philipp [1 ]
Luykx, Atul [2 ,3 ]
Mennink, Bart [2 ,3 ]
机构
[1] Univ Passau, Fak Informat & Math, Passau, Germany
[2] Katholieke Univ Leuven, ESAT COSIC, Dept Elect Engn, Louvain, Belgium
[3] iMinds, Ledeberg, Belgium
关键词
Authenticated encryption; CAESAR; Ascon; CBEAM; ICE-POLE; Keyak; NORX; PRIMATEs; STRIBOB;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Sponge function is known to achieve 2(c/2) security, where c is its capacity. This bound was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min{2(c/2), 2(kappa)} security bound, with. the key length. Similarly, many CAESAR competition submissions are designed to comply with the classical 2(c/2) security bound. We show that Sponge- based constructions for authenticated encryption can achieve the significantly higher bound of min{2(b/2), 2(c), 2(kappa)} asymptotically, with b > c the permutation size, by proving that the CAESAR submission NORX achieves this bound. Furthermore, we show how to apply the proof to five other Sponge- based CAESAR submissions: Ascon, CBEAM/STRIBOB, ICEPOLE, Keyak, and two out of the three PRIMATEs. A direct application of the result shows that the parameter choices of these submissions are overly conservative. Simple tweaks render the schemes considerably more efficient without sacrificing security. For instance, NORX64 can increase its rate and decrease its capacity by 128 bits and Ascon-128 can encrypt three times as fast, both without affecting the security level of their underlying modes in the ideal permutation model.
引用
收藏
页码:85 / 104
页数:20
相关论文
共 50 条
  • [1] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Philipp Jovanovic
    Atul Luykx
    Bart Mennink
    Yu Sasaki
    Kan Yasuda
    [J]. Journal of Cryptology, 2019, 32 : 895 - 940
  • [2] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    Sasaki, Yu
    Yasuda, Kan
    [J]. JOURNAL OF CRYPTOLOGY, 2019, 32 (03) : 895 - 940
  • [3] Sponge-Based Authenticated Encryption: Security Against Quantum Attackers
    Janson, Christian
    Struck, Patrick
    [J]. POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 230 - 259
  • [4] On the Security of Sponge-type Authenticated Encryption Modes
    Chakraborty, Bishwajit
    Jha, Ashwin
    Nandi, Mridul
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 93 - 119
  • [5] Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection
    Jimale, Mohamud Ahmed
    Abdullah, Nor Aniza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Z'Aba, Muhammad Reza
    Jamil, Norziana
    Rohmad, Mohd Saufy
    [J]. IEEE ACCESS, 2023, 11 : 59661 - 59674
  • [6] Customizable Sponge-Based Authenticated Encryption Using 16-bit S-boxes
    Kelly, Matthew
    Kaminsky, Alan
    Kurdziel, Michael
    Lukowiak, Marcin
    Radziszowski, Stanislaw
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 43 - 48
  • [7] Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher
    Bellizia, Davide
    Berti, Francesco
    Bronchain, Olivier
    Cassiers, Gaetan
    Duval, Sebastien
    Guo, Chun
    Leander, Gregor
    Leurent, Gaetan
    Levi, Itamar
    Momin, Charles
    Pereira, Olivier
    Peters, Thomas
    Standaert, Francois-Xavier
    Udvarhelyi, Balazs
    Wiemer, Friedrich
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 295 - 349
  • [8] SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
    Cassiers, Gaetan
    Guo, Chun
    Pereira, Olivier
    Peters, Thomas
    Standaert, Francois-Xavier
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 67 - 85
  • [9] Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    [J]. IEEE ACCESS, 2022, 10 : 50819 - 50838
  • [10] Authenticated encryption mode for beyond the birthday bound security
    Iwata, Tetsu
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 125 - +