Reconsidering Generic Composition



Similar documents
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm

Authenticated Encryption (AE) Instructor: Ahmad Boorghany

Provable-Security Analysis of Authenticated Encryption in Kerberos

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University

Symmetric Crypto MAC. Pierre-Alain Fouque

CryptoVerif Tutorial

Talk announcement please consider attending!

Ciphertext verification security of symmetric encryption schemes

MAC. SKE in Practice. Lecture 5

Message Authentication Code

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

CS155. Cryptography Overview

Evaluation of Some Blockcipher Modes of Operation

Authenticated encryption

Modes of Operation of Block Ciphers

lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal

Authentication and Encryption: How to order them? Motivation

1 Message Authentication

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1

Lecture 13: Message Authentication Codes

Cryptography Overview

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Computational Soundness of Symbolic Security and Implicit Complexity

1 Construction of CCA-secure encryption

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

Cryptography for Secure Channels Kenny Paterson

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

Lecture 9 - Message Authentication Codes

How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions

MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC

On the Security of CTR + CBC-MAC

Message Authentication Codes 133

Network Security - ISA 656 Introduction to Cryptography

MACs Message authentication and integrity. Table of contents

Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages:

Ascon. Ch. Dobraunig 1, M. Eichlseder 1, F. Mendel 1, M. Schläffer 2. 22nd Crypto Day, Infineon, Munich. (A Submission to CAESAR)

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol

SD12 REPLACES: N19780

Message Authentication Codes

Chapter 7. Message Authentication. 7.1 The setting

Network Security. Modes of Operation. Steven M. Bellovin February 3,

Comparison of CBC MAC Variants and Comments on NIST s Consultation Paper

Cryptographic Engine

A low-cost Alternative for OAEP

BPS: a Format-Preserving Encryption Proposal

Lecture 4 Data Encryption Standard (DES)

Secure Network Communications FIPS Non Proprietary Security Policy

NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators

Password-based encryption in ZIP files


Project: Simulated Encrypted File System (SEFS)

AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications

Security Analysis of DRBG Using HMAC in NIST SP

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

WINTER SCHOOL ON COMPUTER SECURITY. Prof. Eli Biham

EXAM questions for the course TTM Information Security May Part 1

On the Security of Double and 2-key Triple Modes of Operation

CS 758: Cryptography / Network Security

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Overview of Symmetric Encryption

Chapter 11. Asymmetric Encryption Asymmetric encryption schemes

On the Security of the Tor Authentication Protocol

Caught in the Maze of Security Standards

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

Sample or Random Security A Security Model for Segment-Based Visual Cryptography

C O M P U T E R S E C U R I T Y

Privacy and Security in library RFID Issues, Practices and Architecture

Advanced Topics in Cryptography and Network Security

EDA385 Embedded Systems Design. Advanced Course

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

Privacy and Security in Cloud Computing

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Victor Shoup Avi Rubin. Abstract

best practices for encryption in android

The Misuse of RC4 in Microsoft Word and Excel

Online signature API. Terms used in this document. The API in brief. Version 0.20,

Chosen-Ciphertext Security from Identity-Based Encryption

Chapter 6 CDMA/802.11i

Chapter 3. Network Domain Security

Cryptography and Network Security: Summary

Yale University Department of Computer Science

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0

Transcription:

Reconsidering Generic Composition Chanathip Namprempre Thammasat University, Thailand Phillip Rogaway University of California, Davis, USA Tom Shrimpton Portland State University, USA 1/24

What is the correct way to build an authenticated encryption scheme from an encryption scheme and a MAC? 2/24

What is the correct way to build an authenticated encryption scheme from an encryption scheme and a MAC? [Bellare-Namprempre ASIACRYPT 2000] Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm Encrypt-and-MAC Encrypt-then-MAC MAC-then-Encrypt always works if encryption IND-CPA secure and MAC unforgeable 3/24

What is the correct way to build an authenticated encryption scheme from an encryption scheme and a MAC? [Bellare-Namprempre ASIACRYPT 2000] Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm Encrypt-and-MAC Encrypt-then-MAC MAC-then-Encrypt always works if encryption IND-CPA secure and MAC unforgeable This summary of [BN] is incorrect. 4/24

Encrypt-then-MAC initialization vector IV M plaintext CtrMode K1 IND-CPA secure encryption scheme IV ciphertext C F K2 T tag secure MAC (e.g. PRF) 5/24

Encrypt-then-MAC M CtrMode K1 if F K2 (C) = T then return Dec K1 (IV,C) else return invalid F K2 IV C T 6/24

Encrypt-then-MAC M CtrMode K1 if F K2 (C) = T then return Dec K1 (IV,C) else return invalid F K2 IV C T But [BN] says??? 7/24

Encrypt-then-MAC vs. Encrypt-then-MAC IV M M Enc K1 IV Enc K1 F K2 F K2 IV C T C T IV-based AE scheme built from an IV-based encryption scheme and a MAC Different starting primitives, different final primitives, different security Probabilistic AE scheme built from a probabilistic encryption scheme and a MAC [BN] is about this setting only. 8/24

Incorrect summary of [BN], in practice ISO/IEC 19772, Mechanism 5 (Encrypt-then-MAC) Information Security Security Techniques Authenticated Encryption S D S required to be a nonce (but not random) Enc K1 C F K2 T Enc = CBC, CTR, OFB, CFB blockcipher modes -- not all have {0,1}* domains -- some require S to be random for IND-CPA S C S not covered by tag Appeals to [BN] to justify security of a nonce-based scheme built from IV-based encryption. 9/24

Okay, fine: EtM + secure prob. Enc + secure MAC = secure prob. AE The thing is 1. Typical goal nowadays is nonce-based AE with associated data (NAE), not probabilistic AE (IV =) N A M NAE (deterministic) C N= nonce ( number used once, e.g. sequence number) A = associated data, bound to plaintext/ciphertext, not private M = plaintext, private 2. Standards and common crypto libraries don t provide probabilistic encryption schemes, they provide IV-based encryption int encrypt(unsigned char *plaintext, int plaintext_len, unsigned char *key, unsigned char *iv, unsigned char *ciphertext) openssl encryption API 10/24

What are the correct ways to compose a secure IV-based encryption scheme and a secure PRF in order to build a nonce-based AE(AD) scheme? 11/24

N A M Our basic NAE forms F iv L M F iv inputs: (N or, A or, M or ) F tag inputs: (N or, A or, M or ) E&M IV Enc K F tag L or (N or, A or, C or ) EtM = missing C T C N A M F iv inputs: (N or, A or, M or ) F tag inputs: (N or, A or, M or ) F iv L M T F tag L IV Enc K C 12/24

160 possible constructions analyzed, resulting in: 8 favored schemes --- generically secure, good security bounds 1 transitional scheme --- generically secure, inferior bound 3 elusive schemes --- despite LOADS of effort, unable to find proofs using only IND$-CPA and PRF security of components, unable to find counterexamples All other schemes --- we find counterexamples (many trivial, some not) What security notion? we target an all-in-one AE notion [RS06], equivalent to IND$-CPA + INT-CTXT 13/24

The favored eight E and M E and M E and M SIV mode [RS06] E then M E then M M then E M then E 14/24

The favored eight all have the same (good, tight) AE security. Which should I use? 15/24

Encryption can compute C,T in parallel Can truncate the tag by truncating AE scheme output 16/24

Encryption can compute C,T in parallel Can truncate the tag by truncating AE scheme output IV must be recoverable from C,T 17/24

Encryption can compute C,T in parallel Can truncate the tag by truncating AE scheme output IV must be recoverable from C,T Nonce-misuse resistan Cannot truncate 18/24

Encryption can compute C,T in parallel Can truncate the tag by truncating AE scheme output IV must be recoverable from C,T Nonce-misuse resistan Cannot truncate Decryption can compute M, check T in parallel Can truncate 19/24

Encryption can compute C,T in parallel Can truncate the tag by truncating AE scheme output IV must be recoverable from C,T Nonce-misuse resistan Cannot truncate Decryption can compute M, check T in parallel Can truncate Cannot truncate MtE style schemes have history of problems in practice20/24

What are these vector input PRFs? Real PRFs (e.g. HMAC-SHA) take a string! F L Can be instantiated in many ways. We use the three-xor construction. F L1,L2,L3 (N,A,M) = f L1 (N) f L2 (A) f L3 (M) F L1,L2,L3 (N,,M) = f L1 (N) 0 n f L3 (M) F L1,L2,L3 (,,M) = 0 n 0 n f L3 (M) etc. 21/24

EAX2 [Bellare, R, Wagner 04] The favored eight, based on a string-input PRF (using the three-xor construction) 22/24

Also in the paper Building NAE from tidy nonce-based encryption and a PRF: Three secure options, one elusive. Proofs of security for elusive schemes under new knowledge of tags assumption An ISO standard that uses [BN] to justify an NAE design = Broken Discussion of tidiness as a syntactic property of deterministic encryption High-level Summary [BN] is fine, but people s understanding of it over-generalizes, leading to problems in practice E&M, EtM, MtE taxonomy / security characterization is specific to building probabilistic AE from probabilistic encryption GC story is much more nuanced when building nonce-based AE 23/24

Thank you! E and M E and M E and M SIV mode [RS06] E then M E then M M then E M then E 24/24

--- END --- 25/24