Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authen...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2017-02-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/568 |
_version_ | 1819173024550617088 |
---|---|
author | Guillaume Endignoux Damian Vizár |
author_facet | Guillaume Endignoux Damian Vizár |
author_sort | Guillaume Endignoux |
collection | DOAJ |
description | Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authenticated encryption schemes, that capture various security goals related to real-life scenarios. Fouque, Joux, Martinet and Valette proposed definitions of privacy and integrity against adversaries that can query their oracles in a blockwise-adaptive manner, to model memory-constrained applications. A decade later, Fleischmann, Forler and Lucks proposed the notion of online nonce misuse-resistant authenticated encryption (OAE) to capture the security of online authenticated encryption under nonce-reuse. In this work we investigate the relation between these notions. We first recast the blockwise notions of Fouque et al. to make them compatible with online authenticated encryption schemes that support headers. We then show that OAE and the conjunction of the blockwise notions are “almost” equivalent. We identify the missing property on the side of blockwise notions, and formalize it under the name PR-TAG. With PR-TAG being just an auxiliary definition, the equivalence we finally show suggests that OAE and the blockwise model for online authenticated encryption capture essentially the same notion of security. |
first_indexed | 2024-12-22T20:16:30Z |
format | Article |
id | doaj.art-97c08c7de83f4e789a7b3065f512ce9d |
institution | Directory Open Access Journal |
issn | 2519-173X |
language | English |
last_indexed | 2024-12-22T20:16:30Z |
publishDate | 2017-02-01 |
publisher | Ruhr-Universität Bochum |
record_format | Article |
series | IACR Transactions on Symmetric Cryptology |
spelling | doaj.art-97c08c7de83f4e789a7b3065f512ce9d2022-12-21T18:13:57ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2017-02-0112514410.13154/tosc.v2016.i2.125-144568Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack ModelsGuillaume Endignoux0Damian Vizár1EPFLEPFLReal-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authenticated encryption schemes, that capture various security goals related to real-life scenarios. Fouque, Joux, Martinet and Valette proposed definitions of privacy and integrity against adversaries that can query their oracles in a blockwise-adaptive manner, to model memory-constrained applications. A decade later, Fleischmann, Forler and Lucks proposed the notion of online nonce misuse-resistant authenticated encryption (OAE) to capture the security of online authenticated encryption under nonce-reuse. In this work we investigate the relation between these notions. We first recast the blockwise notions of Fouque et al. to make them compatible with online authenticated encryption schemes that support headers. We then show that OAE and the conjunction of the blockwise notions are “almost” equivalent. We identify the missing property on the side of blockwise notions, and formalize it under the name PR-TAG. With PR-TAG being just an auxiliary definition, the equivalence we finally show suggests that OAE and the blockwise model for online authenticated encryption capture essentially the same notion of security.https://tosc.iacr.org/index.php/ToSC/article/view/568Symmetric-key CryptographyAuthenticated EncryptionOnline EncryptionSecurity Notions |
spellingShingle | Guillaume Endignoux Damian Vizár Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models IACR Transactions on Symmetric Cryptology Symmetric-key Cryptography Authenticated Encryption Online Encryption Security Notions |
title | Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models |
title_full | Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models |
title_fullStr | Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models |
title_full_unstemmed | Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models |
title_short | Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models |
title_sort | linking online misuse resistant authenticated encryption and blockwise attack models |
topic | Symmetric-key Cryptography Authenticated Encryption Online Encryption Security Notions |
url | https://tosc.iacr.org/index.php/ToSC/article/view/568 |
work_keys_str_mv | AT guillaumeendignoux linkingonlinemisuseresistantauthenticatedencryptionandblockwiseattackmodels AT damianvizar linkingonlinemisuseresistantauthenticatedencryptionandblockwiseattackmodels |