Authenticated and Misuse-Resistant Encryption of Key-Dependent Data

被引:0
|
作者
Bellare, Mihir [1 ]
Keelveedhi, Sriram [1 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, 9500 Gilman Dr, La Jolla, CA 92093 USA
来源
关键词
CIRCULAR-SECURE ENCRYPTION; MESSAGE SECURITY; PLAINTEXT; ATTACKS; MODE; OAEP;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper provides a comprehensive treatment of the security of authenticated encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice of universal nonce or random nonce security and presence or absence of a header. We present attacks showing that universal-nonce security for key-dependent messages is impossible, as is security for key-dependent headers, not only ruling out security for three of the four variants but showing that currently standarized and used schemes (all these target universal nonce security in the presence of headers) fail to provide security for key-dependent data. To complete the picture we show that the final variant (random-nonce security in the presence of key-dependent messages but key-independent headers) is efficiently achievable. Rather than a single dedicated scheme, we present a RO-based transform RHtE that endows any AE scheme with this security, so that existing implementations may be easily upgraded to have the best possible seurity in the presence of key-dependent data. RHtE is cheap, software-friendly, and continues to provide security when the key is a password, a setting in which key-dependent data is particularly likely. We go on to give a key-dependent data treatment of the goal of misuse resistant AE. Implementations are provided and show that RHtE has small overhead.
引用
收藏
页码:610 / 629
页数:20
相关论文
共 50 条
  • [1] Misuse-resistant variants of the OMD authenticated encryption mode
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizár, Damian
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8782 : 55 - 70
  • [2] Misuse-Resistant Variants of the OMD Authenticated Encryption Mode
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizar, Damian
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 55 - 70
  • [3] Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
    Endignoux, Guillaume
    Vizar, Damian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 125 - 144
  • [4] GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
    Gueron, Shay
    Lindell, Yehuda
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 109 - 119
  • [5] ELmE: A Misuse Resistant Parallel Authenticated Encryption
    Datta, Nilanjan
    Nandi, Mridul
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 306 - 321
  • [6] CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
    Trostle, Jonathan
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 25
  • [7] Encryption-scheme security in the presence of key-dependent messages
    Black, J
    Rogaway, P
    Shrimpton, T
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 62 - 75
  • [8] Key-Dependent Nonlinear Component for Block Cipher Encryption Algorithm
    Khan, Waqar Ahmad
    Gondal, Muhammad Asif
    3D RESEARCH, 2014, 5 (04):
  • [9] New method of key-dependent message security for asymmetric encryption
    Lai, Qiqi
    Hu, Yupu
    Chen, Yuan
    Wang, Baocang
    Wang, Fenghe
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2157 - 2170
  • [10] EHE: NONCE MISUSE-RESISTANT MESSAGE AUTHENTICATION
    Agievich, S. V.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2018, (39): : 33 - 41