1. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)
- Author
-
Guo, Chun, Pereira, Olivier, Peters, Thomas, Standaert, François-Xavier, Progress in Cryptology - {LATINCRYPT} 2019, and UCL - SST/ICTM/ELEN - Pôle en ingénierie électrique
- Subjects
Block cipher mode of operation ,Scheme (programming language) ,Authenticated encryption ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Adversary ,Computer security ,computer.software_genre ,Information leakage ,0202 electrical engineering, electronic engineering, information engineering ,NIST ,020201 artificial intelligence & image processing ,Leakage (economics) ,computer ,Cryptographic nonce ,computer.programming_language - Abstract
We propose definitions of authenticated encryption (AE) schemes that offer security guarantees even in the presence of nonce misuse and side-channel information leakage. This is part of an important ongoing effort to make AE more robust, while preserving appealing efficiency properties. Our definitions consider an adversary enhanced with the leakage of all the computations of an AE scheme, together with the possibility to misuse nonces, be it during all queries (in the spirit of misuse-resistance), or only during training queries (in the spirit of misuse-resilience recently introduced by Ashur et al.). These new definitions offer various insights on the effect of leakage in the security landscape. In particular, we show that, in contrast with the black-box setting, leaking variants of INT-CTXT and IND-CPA security do not imply a leaking variant IND-CCA security, and that leaking variants of INT-PTXT and IND-CCA do not imply a leaking variant of INT-CTXT. They also bring a useful scale to reason about and analyze the implementation properties of emerging modes of operation with different levels of leakage-resistance, such as proposed in the ongoing NIST lightweight cryptography competition. We finally propose the first instance of mode of operation that satisfies our most demanding definitions.
- Published
- 2019
- Full Text
- View/download PDF