Authenticated and Misuse-Resistant Encryption of Key-Dependent Data

被引:0
|
作者
Bellare, Mihir [1 ]
Keelveedhi, Sriram [1 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, 9500 Gilman Dr, La Jolla, CA 92093 USA
来源
关键词
CIRCULAR-SECURE ENCRYPTION; MESSAGE SECURITY; PLAINTEXT; ATTACKS; MODE; OAEP;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper provides a comprehensive treatment of the security of authenticated encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice of universal nonce or random nonce security and presence or absence of a header. We present attacks showing that universal-nonce security for key-dependent messages is impossible, as is security for key-dependent headers, not only ruling out security for three of the four variants but showing that currently standarized and used schemes (all these target universal nonce security in the presence of headers) fail to provide security for key-dependent data. To complete the picture we show that the final variant (random-nonce security in the presence of key-dependent messages but key-independent headers) is efficiently achievable. Rather than a single dedicated scheme, we present a RO-based transform RHtE that endows any AE scheme with this security, so that existing implementations may be easily upgraded to have the best possible seurity in the presence of key-dependent data. RHtE is cheap, software-friendly, and continues to provide security when the key is a password, a setting in which key-dependent data is particularly likely. We go on to give a key-dependent data treatment of the goal of misuse resistant AE. Implementations are provided and show that RHtE has small overhead.
引用
收藏
页码:610 / 629
页数:20
相关论文
共 50 条
  • [41] Authenticated public key broadcast encryption with short ciphertexts
    Guo, Dianli
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Li, Wenmin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (16) : 23399 - 23414
  • [42] Key-Dependent S-Boxes and Differential Cryptanalysis
    S. Murphy
    M. J. B. Robshaw
    Designs, Codes and Cryptography, 2002, 27 : 229 - 255
  • [43] Key-Dependent Message Security: Generic Amplification and Completeness
    Benny Applebaum
    Journal of Cryptology, 2014, 27 : 429 - 451
  • [44] Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA)
    Schermann, Raphael
    Urian, Rainer
    Toegl, Ronald
    Bock, Holger
    Steger, Christian
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 646 - 655
  • [45] Key-Dependent Message Security: Generic Amplification and Completeness
    Applebaum, Benny
    JOURNAL OF CRYPTOLOGY, 2014, 27 (03) : 429 - 451
  • [46] Towards key-dependent message security in the standard model
    Hofheinz, Dennis
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 108 - +
  • [47] An Improved Video Steganography: Using Random Key-Dependent
    Alia, Mohammad A.
    Abu Maria, Khulood
    Alsarayreh, Maher A.
    Abu Maria, Eman
    Almanasra, Sally
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 234 - 237
  • [48] Key-Dependent Message Security: Generic Amplification and Completeness
    Applebaum, Benny
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 527 - 546
  • [49] DeKaRT: A new paradigm for key-dependent reversible circuits
    Golic, JD
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 98 - 112
  • [50] PAEWS: Public-Key Authenticated Encryption With Wildcard Search Over Outsourced Encrypted Data
    Luo, Fucai
    Yan, Xingfu
    Yang, Haining
    Zheng, Xiaofan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2212 - 2223