An Overview of CAESAR Mridul Nandi Indian Statistical Institute, - - PowerPoint PPT Presentation

an overview of caesar
SMART_READER_LITE
LIVE PREVIEW

An Overview of CAESAR Mridul Nandi Indian Statistical Institute, - - PowerPoint PPT Presentation

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme An Overview of CAESAR Mridul Nandi Indian Statistical Institute, Kolkata SEPTEMBER 2016


slide-1
SLIDE 1

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

An Overview of CAESAR

Mridul Nandi

Indian Statistical Institute, Kolkata

SEPTEMBER 2016

Authenticated Encryption

slide-2
SLIDE 2

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

1

Introduction

2

CAESAR Competition

3

TriviA : A Streamcipher Based AE Scheme

4

Hardware Implementation of TriviA

5

ELmD : A Blockcipher Based AE Scheme

Authenticated Encryption

slide-3
SLIDE 3

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

A Brief Overview

A proper integration of Encryption and Authentication First Formalized by Bellare and Namprempre [Asiacrypt 00] Proposed EtM (used in IPSec), MtE (used in SSL/TLS) and E&M (used in SSH). Proposed formal security model for Privacy and Authenticity EtM strongest in this security model Other Important Works AE proposed by Jutla, Gligor et al. (XCBC and XECB), Rogaway et al. (OCB) Later CCM, EAX (improved CCM), EAX’ (Update over EAX) and GCM. GCM was recommended by NIST (SP 800-38D)

Authenticated Encryption

slide-4
SLIDE 4

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

1

Introduction

2

CAESAR Competition Classification of CAESAR Candidates by Structure

3

TriviA : A Streamcipher Based AE Scheme

4

Hardware Implementation of TriviA

5

ELmD : A Blockcipher Based AE Scheme

Authenticated Encryption

slide-5
SLIDE 5

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

CAESAR

CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness Announced in 2013 Offer advantages over AES-GCM Suitable for widespread adoption Functional requirements The algorithm receives PMN, SMN (optional), AD and M The algorithm outputs C and T Privacy for M and SMN, Authenticity for PMN, SMN, AD and M

Authenticated Encryption

slide-6
SLIDE 6

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

First Round of CAESAR

57 Submissions (March, 2014) Classification by Primitives of Important Submissions BC-Based - CLOC, SILC, ElmD, OTR, COPA, Joltik, OCB SC-Based - TriviA, Acorn, AEGIS Sponge Based - Ascon, PRIMATEs

Authenticated Encryption

slide-7
SLIDE 7

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

Filter of First Round Candidates

Elemination of Several Candidates 28 candidates are eliminated (some are withdrawn) Some were broken. Some were inefficient Some Important Cryptanalysis Forgery of COBRA, POET, PAES, LAC Cryptanalysis of XLS constructions Forgery and Key recovery of Marble Forgery of iFEED in both standard model and INT-RUP model Forgery and state recovery of PANDA INT-RUP Forgery of AES-CPFB

Authenticated Encryption

slide-8
SLIDE 8

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

Second Round of CAESAR

29 Submissions (July, 2015) Several Attack After Second Round Announcements Key Recovery of 2.5 Round Pi-Cipher Forgery of ICEPOLE INT-RUP Attack on Rate-1 BC based AE (OCB, iFEED) Fault Attack on PAEQ, PRIMATEs, Minalpher, CLOC-SILC

Authenticated Encryption

slide-9
SLIDE 9

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

Third Round of CAESAR

15 Submissions (August, 2016) Structural Classification OTP Mode

Counter Mode - N/A Streamcipher Mode - N/A Sequential Feedback Mode without Counter

Sponge Mode - Ascon, Ketje, Keyak, NORX, Tiaoxin NON-Sponge Mode - ACORN, AEGIS, AES-JAMBU, CLOC-SILC, MORUS

OCB Mode - Deoxys, OCB, OTR Encrypt-Mix-Encrypt Mode - COLM Hash-Counter Mode - AEZ

Authenticated Encryption

slide-10
SLIDE 10

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

Structural Classification of all CAESAR Candidates

OTP Mode

Counter Mode Streamcipher Mode Sequential Feedback Mode without Counter

Sponge Mode NON-Sponge Mode

OCB Mode Encrypt-Mix-Encrypt Mode Hash-Counter Mode

Authenticated Encryption

slide-11
SLIDE 11

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

OTP Mode : Counter Mode

Uses counter value for encryption of each block Encryption of different blocks can be parallel or the M/C block can be sequentially fed May or may not be online iFEED, AES-CPFB, PAEQ, Pi-Cipher, OMD

Acc K Mi/Ci EK ctr Mi/Ci ⊕ Mi Ci

Figure: Counter Mode

Authenticated Encryption

slide-12
SLIDE 12

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

OTP Mode : Streamcipher Mode

Uses expander function (such as streamcipher) Takes the state, updates state and generate random value This random value XORed with M to generate C TriviA, Wheesht, Sablier, Raviyoyla

Figure: Streamcipher Mode

Authenticated Encryption

slide-13
SLIDE 13

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

OTP Mode

  • 3. Sequential Feedback Mode without Counter

Similar to Streamcipher mode Except, the state also contains the previously processed M or previously generated C Two types

Sponge Mode Non-Sponge Mode

Ascon, ICEPOLE, PRIMATEs are Sponge Modes ACorn, CLOC-SILC, MORUS are Non-Sponge Modes d-block delay online security

Authenticated Encryption

slide-14
SLIDE 14

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

Sponge and NON-Sponge Constructions

Figure: Sponge Constructions Figure: Non-Sponge Constructions

Authenticated Encryption

slide-15
SLIDE 15

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

OCB or Tweakable Blockcipher Mode

ECB like structure Nonce can not be misused AES-OCB, AES-OTR

Figure: OCB

Authenticated Encryption

slide-16
SLIDE 16

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

Encrypt-Mix-Encrypt Mode

Encryption module between two collision resistant online hash functions 0-Block delay Online ElmD, COPA, Marble, KIASU

M1 2.L ⊕ EK MM1 X1 IV ρ E−1

K

32.L ⊕ Y1 CC1 C1 M2 22.L ⊕ EK MM2 X2 ρ W1 E−1

K

32.2.L ⊕ Y2 CC2 C2 Ml 7.2l.L ⊕ EK MMl Xl ρ

· · ·

E−1

K

32.2l−1.L ⊕ Y [l] CCl Cl Ml+1 7.2l+1.L⊕ EK MMl+1 Xl+1 ρ Wl E−1

K

32.2l.L ⊕ Yl+1 CCl+1 Cl+1

Figure: ElmD

Authenticated Encryption

slide-17
SLIDE 17

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Classification of CAESAR Candidates by Structure

Hash-Counter Mode (2-pass construction)

Whole M is Hashed generate the tag and an IV IV is used in counter mode to generate C Not Online SIV, BTM, AEZ

Figure: Hash-Counter Mode

Authenticated Encryption

slide-18
SLIDE 18

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

1

Introduction

2

CAESAR Competition

3

TriviA : A Streamcipher Based AE Scheme

4

Hardware Implementation of TriviA

5

ELmD : A Blockcipher Based AE Scheme

Authenticated Encryption

slide-19
SLIDE 19

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

TriviA Encryption Mode

Joint work with Avik Chakraborti CAESAR candidate, Accepted at CHES 2015 and JCEN 2016

M C T

TriviA-SC EHC-Hash Encryption Key Stream Authentication Key Stream

TriviA-SC - Updated version

  • f Trivium.

EHC-Hash - Universal Hash follows EHC technique. TriviA-SC generates encryption and authentication key stream.

Authenticated Encryption

slide-20
SLIDE 20

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

Circuit of TriviA-SC

z A66 A1 A75 A102 B

1

B69 B96 B66 C

1

C66 C120

  • Authenticated Encryption
slide-21
SLIDE 21

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

TriviA-SC Informations

384-bit state - A (132-bit), B (105-bit) and C (147-bit) Loaded with 128-bit key and 128-bit nonce. 1152-round initialization. 64-bit parallelism Nonlinearity in the output KeyExt64 - From output, StExt64 - From state

Authenticated Encryption

slide-22
SLIDE 22

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

Circuit of EHC Hash

64 256 256 16 160 64 32 Bit Multiplier K K

32 32 D/M D

′/M ′

64 MUX 64 32 32 32 32 32 32 VHorner32/5 VHorner64/4

b

32

b

Authenticated Encryption

slide-23
SLIDE 23

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

EHC-Hash Informations

Used underlying Fields - F232 (α) and F264 (β) Expand/Encode-Hash-Combine

Expand by ECCoded (VHorner64/d) Blockwise Hash by PDP-Hash (32-bit Multiplier) Combine by VMultα,d (VHorner32/d+1)

One 32-bit Multiplication for 64-bit block. EHC(d,l) is 2−128 Universal hash (Not ∆-U) EHC(d,l) ⊕ K, K uniform is 2−31d-pairwise independent.

Authenticated Encryption

slide-24
SLIDE 24

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

Circuit of TriviA

Key N

Update64 (18 times)

. .

Update64 Update64 Update64 Update64 (18 times)

. .

Update64 Update64 Update64 EHC-Hash StExt64 StExt64 StExt64 StExt64 StExt64 StExt64 StExt64 KeyExt64 KeyExt64 KeyExt64 KeyExt64 KeyExt64 KeyExt64 V EHC-Hash 5 4

z M C M D T Authenticated Encryption

slide-25
SLIDE 25

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

Informations on TriviA

Arbitrary length M (padded with 10∗) divided into Blocks Block Size w - 64-bit Intermediate tag (if any) - Computed after each ck blocks.

ck = 0 for this Paper (no intermediate tag). ck ∈ {0, 128} for CAESAR submission.

|C| = |M| Size of each of the tags - 128-bit

Authenticated Encryption

slide-26
SLIDE 26

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

Security Level for TriviA

Security Bounds Version Confdentiality Authenticity TriviA-0 128 124 TriviA-128 128 124

Authenticated Encryption

slide-27
SLIDE 27

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

Important Properties of TriviA

Options for Intermediate Tag. TriviA-SC - Updated design of a well studied and efficient (both in hardware and software) stream cipher Trivium. High security level- 128-bits for confidentiality and 124-bits for Authenticity of plaintext. High speed hardware.

Authenticated Encryption

slide-28
SLIDE 28

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

1

Introduction

2

CAESAR Competition

3

TriviA : A Streamcipher Based AE Scheme

4

Hardware Implementation of TriviA

5

ELmD : A Blockcipher Based AE Scheme

Authenticated Encryption

slide-29
SLIDE 29

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

TriviA-Base Architecture

TriviA-Base

Authenticated Encryption

slide-30
SLIDE 30

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

TriviA-Base Architecture Properties

No pipelined register Parallel processing of data 64-bits/ cycle Long Critical path : (2 × 1) 64-bit MUX → 64-bit XOR → 32-bit Mult → Tag Updation → (3 × 1) 160-bit MUX Reduced Speed, Throughput Controller FSM has 3-bit Register

Authenticated Encryption

slide-31
SLIDE 31

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

TriviA-Pipelined Architecture

TriviA-Pipelined

Authenticated Encryption

slide-32
SLIDE 32

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

TriviA-Pipelined Architecture Properties

2 operations in series

32-bit multiplication Tag updation

3 stage pipeline

Increased throughput Increased frequency Extra cycles required

Controller FSM has 3-bit Register

Authenticated Encryption

slide-33
SLIDE 33

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

TriviA ASIC Implementation

Verilog HDL, Synopsys Design Compiler J-2014.09 Technology node: UMC 65nm logic SP/RVT Low-K process Base Implementation

Area : 23.6 KGE Frequency : 1150 MHZ, Throughput : 73.9 Gbps

Pipelined Implementation

Area : 24.4 KGE Frequency : 1425 MHZ, Throughput : 91.2 Gbps

Authenticated Encryption

slide-34
SLIDE 34

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

TriviA ASIC Results Comparison

Schemes KGE Gbps Mbps/GE cpb TriviA-Base 23.6 73.9 3.13 0.12 TriviA-Pipelined 24.4 91.2 3.73 0.12 Scream, iScream 17.29 5.19 0.30

  • NORX

62 28.2 0.45

  • Ascon

7.95 7.77 0.98 0.75 AEGIS-AO1 20.55 1.35 0.07 6.67 AEGIS-AO2 60.88 37.44 0.61 0.33 AEGIS-TO1 88.91 53.55 0.60 0.20 AEGIS-TO2 172.72 121.07 0.70 0.07

Authenticated Encryption

slide-35
SLIDE 35

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme

TriviA FPGA Results

Xilinx ISE 14.7 Default settings, no optimizations Pre-layout synthesis 5.4x better than AES − CCM

Authenticated Encryption

slide-36
SLIDE 36

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

ELmD Mode to encrypt a message of length l

M1 2.L ⊕ EK MM1 X1 IV ρ E−1

K

32.L ⊕ Y1 CC1 C1 M2 22.L ⊕ EK MM2 X2 ρ W1 E−1

K

32.2.L ⊕ Y2 CC2 C2 Ml 7.2l.L ⊕ EK MMl Xl ρ

· · ·

E−1

K

32.2l−1.L ⊕ Y [l] CCl Cl Ml+1 7.2l+1.L⊕ EK MMl+1 Xl+1 ρ Wl E−1

K

32.2l.L ⊕ Yl+1 CCl+1 Cl+1

Message Padding Ml+1 = Ml = l−1

i=1 Mi + (M∗ l ||10∗).

Authenticated Encryption

slide-37
SLIDE 37

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Description of ρ function

W X W ′ = X + 2W Y = X + 3W ρ

Used to provide online linear mix function Yj = Xj + 3.Xj−1 + . . . + 2j−2.3X1 + 2j−1.3.IV

Authenticated Encryption

slide-38
SLIDE 38

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Generation of IV

D[0] = N 3.L ⊕ EK DD[0] Z[0] ρ D[1] 3.2.L ⊕ EK DD[1] Z[1] ρ D[d] 3.2d.L ⊕ EK DD[d] Z[d] ρ · · ·

· · ·

IV

AD Processing Identical to message processing. Parallel and Fully Pipeline Implementable.

Authenticated Encryption

slide-39
SLIDE 39

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Security of ELmD

Online Privacy Advopriv

ELmE(q, σpriv, t) ≤ Advprp E (σpriv, σpriv, t′) +

5σ2

priv

2n . Authenticity Advforge

ELmE(q, σauth, t) ≤ Advprp E (σauth, σauth, t′) + 9σ2 auth

2n + s 2n . σpriv := total no. of blocks of q forward queries. σauth := total no. of blocks of q forward and s forging queries.

Authenticated Encryption

slide-40
SLIDE 40

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Online Privacy of ELmD

M1 2.L ⊕ EK MM1 X1 IV ρ E−1

K

32.L ⊕ Y1 CC1 C1 M2 22.L ⊕ EK MM2 X2 ρ W1 E−1

K

32.2.L ⊕ Y2 CC2 C2 Ml 7.2l.L ⊕ EK MMl Xl ρ

· · ·

E−1

K

32.2l−1.L ⊕ Y [l] CCl Cl Ml+1 7.2l+1.L⊕ EK MMl+1 Xl+1 ρ Wl E−1

K

32.2l.L ⊕ Yl+1 CCl+1 Cl+1

Claim 1 X i

j is fresh unless Mi j = Mi′ j .

Authenticated Encryption

slide-41
SLIDE 41

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Online Privacy of ELmD

M1 2.L ⊕ EK MM1 X1 IV ρ E−1

K

32.L ⊕ Y1 CC1 C1 M2 22.L ⊕ EK MM2 X2 ρ W1 E−1

K

32.2.L ⊕ Y2 CC2 C2 Ml 7.2l.L ⊕ EK MMl Xl ρ

· · ·

E−1

K

32.2l−1.L ⊕ Y [l] CCl Cl Ml+1 7.2l+1.L⊕ EK MMl+1 Xl+1 ρ Wl E−1

K

32.2l.L ⊕ Yl+1 CCl+1 Cl+1

Claim 2 Y i

j = X i j + 3.X i j−1 + . . . + 2j−2.3.X i 1 + 2j−1.3.IV i is fresh unless

Mi

1..j = Mi′ 1..j.

Authenticated Encryption

slide-42
SLIDE 42

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Online Privacy of ELmD

M1 2.L ⊕ EK MM1 X1 IV ρ E−1

K

32.L ⊕ Y1 CC1 C1 M2 22.L ⊕ EK MM2 X2 ρ W1 E−1

K

32.2.L ⊕ Y2 CC2 C2 Ml 7.2l.L ⊕ EK MMl Xl ρ

· · ·

E−1

K

32.2l−1.L ⊕ Y [l] CCl Cl Ml+1 7.2l+1.L⊕ EK MMl+1 Xl+1 ρ Wl E−1

K

32.2l.L ⊕ Yl+1 CCl+1 Cl+1

Claim 3 ∀i, Y i

li+1 is fresh.

Authenticated Encryption

slide-43
SLIDE 43

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Authenticity of ELmD

M1 2.L ⊕ EK MM1 X1 IV ρ E−1

K

32.L ⊕ Y1 CC1 C1 M2 22.L ⊕ EK MM2 X2 ρ W1 E−1

K

32.2.L ⊕ Y2 CC2 C2 Ml 7.2l.L ⊕ EK MMl Xl ρ

· · ·

E−1

K

32.2l−1.L ⊕ Y [l] CCl Cl Ml+1 7.2l+1.L⊕ EK MMl+1 Xl+1 ρ Wl E−1

K

32.2l.L ⊕ Yl+1 CCl+1 Cl+1

Main Claim For any forged ciphertext C f

1..l, Y f l+1 is fresh.

Authenticated Encryption

slide-44
SLIDE 44

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Low End Device Compatibility

Online ith ciphertext block depends on first i plaintext blocks. Nonce Misuse Resistant Provides Online PRP Security even if nonce is repeated. Problem of Limited buffer Use intermediate tags to stop releasing unverified plaintext. Generate intremediate tags after each k < 128 blocks: ITi = E −1

K (Wk.i) + ∆

Authenticated Encryption

slide-45
SLIDE 45

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Design Rationale

EME type Structure EME with linear mixing obtain online PRP Security and fully pipeline implementable. Decryption in Lower Level Identical Enc-Dec structure: combined hardware implementation area is minimized. ρ mixing Easy Intermediate tag generation. Plain xor mixing require intermeiate tag generation through checksum and more buffer required.

Authenticated Encryption

slide-46
SLIDE 46

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Identical Enc-Dec structure for ELmD.

Hardware Implementation Combined hardware implementation area is minimized.

Type Is final Type Is complete

mask2

J JJ R S Q QQ

mix

W

b b b

K[0] K[10] RD RD−1

b b b

K[10] K[0] Type Is complete

mask1

δ1 δ2

Authenticated Encryption

slide-47
SLIDE 47

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

ELmD: Robustness

Use as Online Encryption/Decryption only Scheme Set associated data as empty and IV = 1. Return C1..l. Use as MAC only Set Associated data empty and IV = 1. Return (M, T = Cl+1). Use to check integrity of associated data only Set message as empty and M1 = 0. Return (D, T = C1).

Authenticated Encryption

slide-48
SLIDE 48

Introduction CAESAR Competition TriviA : A Streamcipher Based AE Scheme Hardware Implementation of TriviA ELmD : A Blockcipher Based AE Scheme Specification of ELmD Mode Security of ELmD Features of ELmD Robustness

Thank you

Authenticated Encryption