The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption
September 29, 2015
Atul Luykx, Bart Preneel, Kan Yasuda
1 / 15
The Limited Power of Verification Queries in Message Authentication - - PowerPoint PPT Presentation
The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015 Atul Luykx, Bart Preneel, Kan Yasuda 1 / 15 Modes of Operation p E K F K E K 2 / 15 Modes of Operation p E K F K
1 / 15
2 / 15
2 / 15
1 Reduce security of AE scheme to that of underlying primitive 2 For AE this is done for confidentiality and authenticity
2 / 15
1 Reduction is often not perfect, results in a loss of security 2 Loss of security quantified in terms of parameters
3 / 15
4 / 15
σ2 2n + (S)PRP σ2 2n σ2 2n + PRF
4 / 15
σ2 2n + (S)PRP σ2 2n σ2 2n + PRF
2n
2n
2n
2n
4 / 15
5 / 15
5 / 15
5 / 15
6 / 15
6 / 15
6 / 15
6 / 15
1 Better parameter choices 2 Increased longevity 3 Increased efficiency
7 / 15
1 Better parameter choices 2 Increased longevity 3 Increased efficiency
7 / 15
8 / 15
9 / 15
1 128 bit block cipher
9 / 15
1 128 bit block cipher 2 Only one-block verification queries
9 / 15
1 128 bit block cipher 2 Only one-block verification queries
9 / 15
1 128 bit block cipher 2 Only one-block verification queries
9 / 15
1 128 bit block cipher 2 Only one-block verification queries
9 / 15
1 Nonce-based 2 Multiple keys
10 / 15
1 Nonce-based 2 Multiple keys
1 except for TBC modes, none with optimal bounds 2 Generic composition: reduction to MAC-security
10 / 15
11 / 15
11 / 15
12 / 15
?
12 / 15
13 / 15
v 2τ + PRF(q + v)
13 / 15
v 2τ + PRF(q + v)
2s
v 2τ + PRF(q + v)
2s
13 / 15
14 / 15
14 / 15
14 / 15
14 / 15
1 Better security bounds improve longevity and efficiency of
15 / 15
1 Better security bounds improve longevity and efficiency of
2 Many schemes exhibit a quadratic dependence on verification
15 / 15
1 Better security bounds improve longevity and efficiency of
2 Many schemes exhibit a quadratic dependence on verification
15 / 15
1 Better security bounds improve longevity and efficiency of
2 Many schemes exhibit a quadratic dependence on verification
1 Generalizing known techniques, applied to GCM to recover
2 Analyze block cipher based modes in detail, applied to PMAC
15 / 15