Revisiting the Security of COMET Authenticated Encryption Scheme

被引:0
|
作者
Gueron, Shay [1 ,2 ]
Jha, Ashwin [3 ]
Nandi, Mridul [4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Amazon Web Serv, Seattle, WA USA
[3] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[4] Indian Stat Inst, Kolkata, India
来源
基金
以色列科学基金会;
关键词
COMET; ICM; Provable security; Rekeying; Lightweight; AEAD;
D O I
10.1007/978-3-030-92518-5_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
COMETv1, by Gueron, Jha and Nandi, is a mode of operation for nonce-based authenticated encryption with associated data functionality. It was one of the second round candidates in the ongoing NIST Lightweight Cryptography Standardization Process. In this paper, we study a generalized version of COMETv1, that we call gCOMET, from provable security perspective. First, we present a comprehensive and complete security proof for gCOMET in the ideal cipher model. Second, we view COMET, the underlying mode of operation in COMETv1, as an instantiation of gCOMET, and derive its concrete security bounds. Finally, we propose another instantiation of gCOMET, dubbed COMETv2, and show that this version achieves better security guarantees as well as memory-efficient implementations as compared to COMETv1.
引用
收藏
页码:3 / 25
页数:23
相关论文
共 50 条
  • [1] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [2] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [3] Comments on the security of Chen's authenticated encryption scheme
    Rasslan, Mohamed
    Youssef, Amr
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (01) : 71 - 74
  • [4] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [5] A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security
    Peng, Zhiniang
    Tang, Shaohua
    Jiang, Linzhi
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 86 - 99
  • [6] ZLR: a fast online authenticated encryption scheme achieving full security
    Choi, Wonseok
    Hwang, Seongha
    Lee, Byeonghak
    Lee, Jooyoung
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (10) : 3261 - 3316
  • [7] On the security of a convertible authenticated encryption
    Zhang, JH
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1063 - 1069
  • [8] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [9] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [10] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129