APE(X): Authenticated Permutation-Based Encryption with Extended Misuse Resistance
Atul Luykx
COSIC, KU Leuven
August 14, 2013 Joint work with A. Bogdanov, E. Andreeva, B. Mennink, N. Mouha, K. Yasuda
1 / 16
APE(X): Authenticated Permutation-Based Encryption with Extended - - PowerPoint PPT Presentation
APE(X): Authenticated Permutation-Based Encryption with Extended Misuse Resistance Atul Luykx COSIC, KU Leuven August 14, 2013 Joint work with A. Bogdanov, E. Andreeva, B. Mennink, N. Mouha, K. Yasuda 1 / 16 Stateless, Deterministic
COSIC, KU Leuven
1 / 16
2 / 16
3 / 16
4 / 16
5 / 16
5 / 16
+ + + +
+
+
6 / 16
+ + + +
7 / 16
p−1 p−1 p−1 p−1
+
+ + +
+
8 / 16
1 Proof with ideal permutation (sponge) 2 Tag cannot be truncated 3 Suited for lightweight 4 Online?
9 / 16
10 / 16
+ + + 11 / 16
K
K
+ + + 12 / 16
p−1 p−1 p−1 p−1
+
+ + +
+
13 / 16
+ + + +
+
+
14 / 16
1 Reducing key size 2 Designing a permutation with efficient inverse 3 Ideal model versus standard model 4 How to deal with nonces: public message
15 / 16
16 / 16