authenticated encryption requirements
play

Authenticated Encryption Requirements David McGrew mcgrew@cisco.com - PowerPoint PPT Presentation

Desiderata Current AEAD use Evolution Conclusions Authenticated Encryption Requirements David McGrew mcgrew@cisco.com Directions in Authenticated Ciphers, 2012 Desiderata Current AEAD use Evolution Conclusions Many desirable attributes


  1. Desiderata Current AEAD use Evolution Conclusions Authenticated Encryption Requirements David McGrew mcgrew@cisco.com Directions in Authenticated Ciphers, 2012

  2. Desiderata Current AEAD use Evolution Conclusions Many desirable attributes High security Computationally cheap Low latency Compact in software and/or hardware Re-use existing cryptographic components Randomized (no nonce) Misuse resistance Side channel resistance Forward security Postquantum Key agility Beyond birthday bound security Message length hiding

  3. Desiderata Current AEAD use Evolution Conclusions Domains of use message size data rates goals Links 40 to 0.6 to low latency 2000 bytes 100 Gbit Internet 40 to 1 to 10 Mbit 2000 bytes Low power 1 to 100 bytes 20 to low expansion wireless 250 Kbits compact Data 512 to 400 Mbit randomized? at rest 4096 bytes

  4. Desiderata Current AEAD use Evolution Conclusions AEAD in standards AES-CCM 802.11i , 802.15 , ESP , TLS protocols AES-GCM 802.1AE (MACsec) , INCITS Fibre Channel (FC-SP) , IKE , ESP , TLS , SSH, and SRTP , P1619.1 and LTO-4 tape storage; Suite B AES-OCB 802.11i Camellia-GCM TLS ARIA-GCM TLS SEED-GCM TLS

  5. Desiderata Current AEAD use Evolution Conclusions Issues CCM Pre-encryption plaintext buffering

  6. Desiderata Current AEAD use Evolution Conclusions Issues CCM Pre-encryption plaintext buffering but short messages used in practice

  7. Desiderata Current AEAD use Evolution Conclusions Issues CCM Pre-encryption plaintext buffering but short messages used in practice Serialized

  8. Desiderata Current AEAD use Evolution Conclusions Issues CCM Pre-encryption plaintext buffering but short messages used in practice Serialized GCM Authentication weaker for longer messages

  9. Desiderata Current AEAD use Evolution Conclusions Issues CCM Pre-encryption plaintext buffering but short messages used in practice Serialized GCM Authentication weaker for longer messages but short messages used in practice

  10. Desiderata Current AEAD use Evolution Conclusions Issues CCM Pre-encryption plaintext buffering but short messages used in practice Serialized GCM Authentication weaker for longer messages but short messages used in practice Nonce hashing imperfect

  11. Desiderata Current AEAD use Evolution Conclusions Issues CCM Pre-encryption plaintext buffering but short messages used in practice Serialized GCM Authentication weaker for longer messages but short messages used in practice Nonce hashing imperfect but unused in practice

  12. Desiderata Current AEAD use Evolution Conclusions Issues CCM Pre-encryption plaintext buffering but short messages used in practice Serialized GCM Authentication weaker for longer messages but short messages used in practice Nonce hashing imperfect but unused in practice Compact software implementations difficult

  13. Desiderata Current AEAD use Evolution Conclusions Issues CCM Pre-encryption plaintext buffering but short messages used in practice Serialized GCM Authentication weaker for longer messages but short messages used in practice Nonce hashing imperfect but unused in practice Compact software implementations difficult Nonce re-use, short tags

  14. Desiderata Current AEAD use Evolution Conclusions GCM � IV � 0 31 1 if len ( IV ) = w − 32 Y 0 = GHASH ( H , {} , IV ) otherwise. Y i = incr ( Y i − 1 ) for i = 1 , . . . , n C i = P i ⊕ E ( K , Y i ) for i = 1 , . . . , n − 1 C ∗ n = P ∗ n ⊕ MSB u ( E ( K , Y n )) T = MSB t ( GHASH ( H , A , C ) ⊕ E ( K , Y 0 )) H = E ( K , 0 w )

  15. Desiderata Current AEAD use Evolution Conclusions GCM evolution? � IV � 0 31 1 if len ( IV ) = w − 32 Y 0 = GHASH ( H , {} , IV ) otherwise. Y i = incr ( Y i − 1 ) for i = 1 , . . . , n C i = P i ⊕ E ( K , Y i ) for i = 1 , . . . , n − 1 C ∗ n = P ∗ n ⊕ MSB u ( E ( K , Y n )) T = MSB t ( HASH ( E ( K , Y 0 ) , A , C )) per-packet hash key secure against nonce reuse, short authentication tags

  16. Desiderata Current AEAD use Evolution Conclusions GCM evolution? � IV � 0 31 1 if len ( IV ) = w − 32 Y 0 = GHASH ( H , {} , IV ) otherwise. Y i = incr ( Y i − 1 ) for i = 1 , . . . , n C i = P i ⊕ E ( K , Y i ) for i = 1 , . . . , n − 1 C ∗ n = P ∗ n ⊕ MSB u ( E ( K , Y n )) T = MSB t ( HASH ( E ( K , Y 0 ) , A , C )) per-packet hash key secure against nonce reuse, short authentication tags HASH can be software friendly (e.g. [RWB]) or E -based

  17. Desiderata Current AEAD use Evolution Conclusions GCM evolution? � IV � 0 31 1 if len ( IV ) = w − 32 Y 0 = GHASH ( H , {} , IV ) otherwise. Y i = incr ( Y i − 1 ) for i = 1 , . . . , n C i = P i ⊕ E ( K , Y i ) for i = 1 , . . . , n − 1 C ∗ n = P ∗ n ⊕ MSB u ( E ( K , Y n )) T = MSB t ( HASH ( E ( K , Y 0 ) , A , C )) per-packet hash key secure against nonce reuse, short authentication tags HASH can be software friendly (e.g. [RWB]) or E -based Broadens applicability, but may not address all domains

  18. Desiderata Current AEAD use Evolution Conclusions Recommendations

  19. Desiderata Current AEAD use Evolution Conclusions Recommendations Encourage exploration of design space

  20. Desiderata Current AEAD use Evolution Conclusions Recommendations Encourage exploration of design space Avoid over focus on performance, compactness, . . .

  21. Desiderata Current AEAD use Evolution Conclusions Recommendations Encourage exploration of design space Avoid over focus on performance, compactness, . . . Identify domains of use

  22. Desiderata Current AEAD use Evolution Conclusions Recommendations Encourage exploration of design space Avoid over focus on performance, compactness, . . . Identify domains of use Low power wireless

  23. Desiderata Current AEAD use Evolution Conclusions Recommendations Encourage exploration of design space Avoid over focus on performance, compactness, . . . Identify domains of use Low power wireless Document requirements within each domain

  24. Desiderata Current AEAD use Evolution Conclusions Recommendations Encourage exploration of design space Avoid over focus on performance, compactness, . . . Identify domains of use Low power wireless Document requirements within each domain Identify critical requirements

  25. Desiderata Current AEAD use Evolution Conclusions Recommendations Encourage exploration of design space Avoid over focus on performance, compactness, . . . Identify domains of use Low power wireless Document requirements within each domain Identify critical requirements Side channel resistance

  26. Desiderata Current AEAD use Evolution Conclusions Recommendations Encourage exploration of design space Avoid over focus on performance, compactness, . . . Identify domains of use Low power wireless Document requirements within each domain Identify critical requirements Side channel resistance Available royalty-free worldwide

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend