2017
DOI: 10.1007/978-3-319-63697-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Boosting Authenticated Encryption Robustness with Minimal Modifications

Abstract: Abstract. Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidentiality and authenticity in the symmetric-key setting have existed for well over a decade. By all conventional measures, AES-OCB seems to be the AE algorithm of choice on any platform with AES-NI: it has a proof showing it is secure assuming AES is, and it is one of the fastest out of all such algorithms. However, algorithms such as AES-GCM and ChaCha20+Poly1305 have seen more widespread adoption, even tho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
32
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(33 citation statements)
references
References 44 publications
1
32
0
Order By: Relevance
“…In this paper we describe a universal forgery attack against GCM-RUP with time and data complexity close to 2 n/2 , where n denotes the block size of the underlying block cipher. This attack matches the security proof given in [2], showing that it is tight. However, our main result is not only about tightness of the (birthday) security bound, but rather about how badly the construction of GCM-RUP breaks when the bound is reached: a universal forgery attack is much stronger than a distinguishing attack.…”
Section: Contributionssupporting
confidence: 82%
See 3 more Smart Citations
“…In this paper we describe a universal forgery attack against GCM-RUP with time and data complexity close to 2 n/2 , where n denotes the block size of the underlying block cipher. This attack matches the security proof given in [2], showing that it is tight. However, our main result is not only about tightness of the (birthday) security bound, but rather about how badly the construction of GCM-RUP breaks when the bound is reached: a universal forgery attack is much stronger than a distinguishing attack.…”
Section: Contributionssupporting
confidence: 82%
“…This paper shows a birthday-bound attack against GCM-RUP [2] using inner collisions to recover the output difference of the function GHASH K2 . Hence, K 2 can be retrieved by solving a polynomial equation, and this directly leads to a universal forgery attack against GCM-RUP.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In the model of RUP security, the adversary turns out to have significantly more power: since the introduction of the model, various schemes have been forged in the RUP model [CDN16,DLMN17,IMI18], and schemes that have been proven to achieve RUP authenticity often come at a cost [ZWH + 17, HSY17,ADL17]. For plaintext awareness, the situation is even more poignant: the model is often ignored, which arguably comes from the fact that the model is more complicated (it requires the description of a simulator).…”
Section: Release Of Unverified Plaintextmentioning
confidence: 99%