Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models

Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authen...

Full description

Bibliographic Details
Main Authors: Guillaume Endignoux, Damian Vizár
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2017-02-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/568
_version_ 1819173024550617088
author Guillaume Endignoux
Damian Vizár
author_facet Guillaume Endignoux
Damian Vizár
author_sort Guillaume Endignoux
collection DOAJ
description Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authenticated encryption schemes, that capture various security goals related to real-life scenarios. Fouque, Joux, Martinet and Valette proposed definitions of privacy and integrity against adversaries that can query their oracles in a blockwise-adaptive manner, to model memory-constrained applications. A decade later, Fleischmann, Forler and Lucks proposed the notion of online nonce misuse-resistant authenticated encryption (OAE) to capture the security of online authenticated encryption under nonce-reuse. In this work we investigate the relation between these notions. We first recast the blockwise notions of Fouque et al. to make them compatible with online authenticated encryption schemes that support headers. We then show that OAE and the conjunction of the blockwise notions are “almost” equivalent. We identify the missing property on the side of blockwise notions, and formalize it under the name PR-TAG. With PR-TAG being just an auxiliary definition, the equivalence we finally show suggests that OAE and the blockwise model for online authenticated encryption capture essentially the same notion of security.
first_indexed 2024-12-22T20:16:30Z
format Article
id doaj.art-97c08c7de83f4e789a7b3065f512ce9d
institution Directory Open Access Journal
issn 2519-173X
language English
last_indexed 2024-12-22T20:16:30Z
publishDate 2017-02-01
publisher Ruhr-Universität Bochum
record_format Article
series IACR Transactions on Symmetric Cryptology
spelling doaj.art-97c08c7de83f4e789a7b3065f512ce9d2022-12-21T18:13:57ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2017-02-0112514410.13154/tosc.v2016.i2.125-144568Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack ModelsGuillaume Endignoux0Damian Vizár1EPFLEPFLReal-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authenticated encryption schemes, that capture various security goals related to real-life scenarios. Fouque, Joux, Martinet and Valette proposed definitions of privacy and integrity against adversaries that can query their oracles in a blockwise-adaptive manner, to model memory-constrained applications. A decade later, Fleischmann, Forler and Lucks proposed the notion of online nonce misuse-resistant authenticated encryption (OAE) to capture the security of online authenticated encryption under nonce-reuse. In this work we investigate the relation between these notions. We first recast the blockwise notions of Fouque et al. to make them compatible with online authenticated encryption schemes that support headers. We then show that OAE and the conjunction of the blockwise notions are “almost” equivalent. We identify the missing property on the side of blockwise notions, and formalize it under the name PR-TAG. With PR-TAG being just an auxiliary definition, the equivalence we finally show suggests that OAE and the blockwise model for online authenticated encryption capture essentially the same notion of security.https://tosc.iacr.org/index.php/ToSC/article/view/568Symmetric-key CryptographyAuthenticated EncryptionOnline EncryptionSecurity Notions
spellingShingle Guillaume Endignoux
Damian Vizár
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
IACR Transactions on Symmetric Cryptology
Symmetric-key Cryptography
Authenticated Encryption
Online Encryption
Security Notions
title Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
title_full Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
title_fullStr Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
title_full_unstemmed Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
title_short Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
title_sort linking online misuse resistant authenticated encryption and blockwise attack models
topic Symmetric-key Cryptography
Authenticated Encryption
Online Encryption
Security Notions
url https://tosc.iacr.org/index.php/ToSC/article/view/568
work_keys_str_mv AT guillaumeendignoux linkingonlinemisuseresistantauthenticatedencryptionandblockwiseattackmodels
AT damianvizar linkingonlinemisuseresistantauthenticatedencryptionandblockwiseattackmodels