Generalities Stateless Deterministic MACs Nonce-Based MACs
Beyond-Birthday-Bound Secure MACs
Yannick Seurin
ANSSI, France
January 2018, Dagstuhl Seminar
- Y. Seurin
BBB Secure MACs January 2018 1 / 44
Beyond-Birthday-Bound Secure MACs Yannick Seurin ANSSI, France - - PowerPoint PPT Presentation
Generalities Stateless Deterministic MACs Nonce-Based MACs Beyond-Birthday-Bound Secure MACs Yannick Seurin ANSSI, France January 2018, Dagstuhl Seminar Y. Seurin BBB Secure MACs January 2018 1 / 44 Generalities Stateless Deterministic
Generalities Stateless Deterministic MACs Nonce-Based MACs
ANSSI, France
BBB Secure MACs January 2018 1 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 2 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 2 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 2 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 2 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 2 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 2 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 3 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 4 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
T = MACK(N, M) MACK(N′, M′) = T ′ ?
BBB Secure MACs January 2018 5 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
T = MACK(N, M) MACK(N′, M′) = T ′ ? (N, M) T
BBB Secure MACs January 2018 5 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
T = MACK(N, M) MACK(N′, M′) = T ′ ? (N, M) T (N′, M′, T ′) 0/1
BBB Secure MACs January 2018 5 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
addition to the key and the message M
nonces in MAC queries and nonce-misusing otherwise
BBB Secure MACs January 2018 6 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
addition to the key and the message M
nonces in MAC queries and nonce-misusing otherwise
BBB Secure MACs January 2018 6 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
addition to the key and the message M
nonces in MAC queries and nonce-misusing otherwise
BBB Secure MACs January 2018 6 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
F
proba.
F
BBB Secure MACs January 2018 7 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
F
proba.
F
BBB Secure MACs January 2018 7 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
F
proba.
F
BBB Secure MACs January 2018 7 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
E X Y K
X Y K W n = block size t = tweak size
BBB Secure MACs January 2018 8 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
E X Y K
X Y K W n = block size t = tweak size
BBB Secure MACs January 2018 8 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
E X Y K
X Y K W n = block size t = tweak size
BBB Secure MACs January 2018 8 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
E X Y K
X Y K W n = block size t = tweak size
BBB Secure MACs January 2018 8 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 9 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 10 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ T
BBB Secure MACs January 2018 11 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ T
BBB Secure MACs January 2018 11 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ T
BBB Secure MACs January 2018 11 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ T
F◦H (q) ≤ q2ε
F
BBB Secure MACs January 2018 12 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ T
F◦H (q) ≤ q2ε
F
BBB Secure MACs January 2018 12 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ T
BBB Secure MACs January 2018 13 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ T
BBB Secure MACs January 2018 13 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ T
BBB Secure MACs January 2018 13 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 14 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M HK H′
K ′
T
Hash as Tweak (HaT) [CLS17] M HK T
Hash-then-TBC [LN17]
BBB Secure MACs January 2018 15 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M HK H′
K ′
T
Hash as Tweak (HaT) [CLS17] M HK T
Hash-then-TBC [LN17]
BBB Secure MACs January 2018 15 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M G T
BBB Secure MACs January 2018 16 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M G T
BBB Secure MACs January 2018 16 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M G T
BBB Secure MACs January 2018 16 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M HK H′
K ′
T E Hash as Key (HaK)
BBB Secure MACs January 2018 17 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 18 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M[1] M[2] M[3] M[4] Tag 0n 1 2 3 4
BBB Secure MACs January 2018 19 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M[1] M[2] M[3] 0n 1 2 3 0n 2 2 2 2 2 2
BBB Secure MACs January 2018 20 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M[1] M[2] M[3] 0n 1 2 3 0n 2 2 2 2 2 2
BBB Secure MACs January 2018 20 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M[1] M[2] M[3] 0n 1 2 3 0n 2 2 2 2 2 2
BBB Secure MACs January 2018 20 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M[1] M[2] M[3] 0n 1 2 3 0n 2 2 2 2 2 2
BBB Secure MACs January 2018 20 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
X[1] Xℓ Xr
K
t Lℓ Lr t 2 0n 0t X[2] Xℓ Xr
K
t 2 · Lℓ 2 · Lr t 2 . . . . . . X[m] Xℓ Xr
K
t 2m−1 · Lℓ 2m−1 · Lr t 2 U V
BBB Secure MACs January 2018 21 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 22 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
⇒ not a PRF
BBB Secure MACs January 2018 23 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
⇒ not a PRF
BBB Secure MACs January 2018 23 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
⇒ not a PRF
BBB Secure MACs January 2018 23 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 24 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 25 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M T
WC (q, v) ≤ vε + AdvPRF F
BBB Secure MACs January 2018 26 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M T FK ′ N
WC (q, v) ≤ vε + AdvPRF F
BBB Secure MACs January 2018 26 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M T FK ′ N
WC (q, v) ≤ vε + AdvPRF F
BBB Secure MACs January 2018 26 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M T FK ′ N
WC (q, v) ≤ vε + AdvPRF F
BBB Secure MACs January 2018 26 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ N T
WCS (q, v) ≤ vε + (q + v)2
E
BBB Secure MACs January 2018 27 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N T
WCS (q, v) ≤ vε + (q + v)2
E
BBB Secure MACs January 2018 27 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N T
WCS (q, v) ≤ vε + (q + v)2
E
BBB Secure MACs January 2018 27 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N T
WCS (q, v) ≤ vε + (q + v)2
E
BBB Secure MACs January 2018 27 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ N T
BBB Secure MACs January 2018 28 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ N T
BBB Secure MACs January 2018 28 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ N FK ′′ T
BBB Secure MACs January 2018 28 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ N EK ′′ T
BBB Secure MACs January 2018 28 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ N EK ′′ T
BBB Secure MACs January 2018 29 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ N EK ′′ T EK ′ N
BBB Secure MACs January 2018 29 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M FK ′ N EK ′′ T EK ′ N
BBB Secure MACs January 2018 29 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N EK ′′ T
BBB Secure MACs January 2018 29 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N EK ′′ T
BBB Secure MACs January 2018 29 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N EK ′′ T
BBB Secure MACs January 2018 30 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N EK ′′ T
BBB Secure MACs January 2018 30 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 31 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 31 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 31 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 31 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 31 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M HK N T
Nonce as Tweak (NaT) M HK N T E Nonce as Key (NaK)
NaT/NaK (q, v) ≤ µqε + (. . .)
BBB Secure MACs January 2018 32 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M HK N T
Nonce as Tweak (NaT) M HK N T E Nonce as Key (NaK)
NaT/NaK (q, v) ≤ µqε + (. . .)
BBB Secure MACs January 2018 32 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 33 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N EK ′ T
BBB Secure MACs January 2018 34 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N EK ′ T
BBB Secure MACs January 2018 34 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M EK ′ N EK ′ T
BBB Secure MACs January 2018 34 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M P N T
HK(M) ⊕ HK(M′) = T ⊕ T ′
BBB Secure MACs January 2018 35 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M P N T
HK(M) ⊕ HK(M′) = T ⊕ T ′
BBB Secure MACs January 2018 35 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
HK M P N T
WC (q, 1) ≤ vε + (q + 1)2
BBB Secure MACs January 2018 36 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M[1] EK M[2] EK M[3] EK P′ N T
BBB Secure MACs January 2018 37 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M[1] P M[2] P M[3] P P′ N T
BBB Secure MACs January 2018 37 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
M[1] P M[2] P M[3] P P′ N T
BBB Secure MACs January 2018 37 / 44
Generalities Stateless Deterministic MACs Nonce-Based MACs
BBB Secure MACs January 2018 38 / 44
References
Daniel J. Bernstein. Stronger Security Bounds for Wegman-Carter-Shoup
EUROCRYPT 2005, volume 3494 of LNCS, pages 164–180. Springer, 2005. John Black and Phillip Rogaway. A Block-Cipher Mode of Operation for Parallelizable Message Authentication. In Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of LNCS, pages 384–397. Springer, 2002. Benoît Cogliati, Jooyoung Lee, and Yannick Seurin. New Constructions of MACs from (Tweakable) Block Ciphers. IACR Trans. Symmetric Cryptol., 2017(2):27–58, 2017. Benoît Cogliati and Yannick Seurin. EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC. In Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology - CRYPTO 2016 (Proceedings, Part I), volume 9814 of LNCS, pages 121–149. Springer, 2016.
BBB Secure MACs January 2018 39 / 44
References
Benoît Cogliati and Yannick Seurin. Analysis of the Single-Permutation Encrypted Davies-Meyer Construction. Des. Codes Cryptography, 2018. Wei Dai, Viet Tung Hoang, and Stefano Tessaro. Information-theoretic Indistinguishability via the Chi-squared Method. In Jonathan Katz and Hovav Shacham, editors, Advances in Cryptology - CRYPTO 2017 (Proceedings, Part III), volume 10403 of LNCS, pages 497–523. Springer,
Edgar N. Gilbert, F. Jessie MacWilliams, and Neil J. A. Sloane. Codes which detect deception. Bell System Technical Journal, 53(3):405–424, 1974. Helena Handschuh and Bart Preneel. Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. In David Wagner, editor, Advances in Cryptology - CRYPTO 2008, volume 5157 of LNCS, pages 144–161. Springer, 2008. Tetsu Iwata and Kazuhiko Minematsu. Stronger Security Variants of GCM-SIV. IACR Trans. Symmetric Cryptol., 2016(1):134–157, 2016.
BBB Secure MACs January 2018 40 / 44
References
Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, and Yannick Seurin. ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message
in Cryptology - CRYPTO 2017 (Proceedings, Part III), volume 10403 of LNCS, pages 34–65. Springer, 2017. Jakob Jonsson. On the Security of CTR + CBC-MAC. In Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography - SAC 2002, volume 2595 of LNCS, pages 76–93. Springer, 2002. Antoine Joux. Authentication Failures in NIST Version of GCM. Comments submitted to NIST Modes of Operation Process, 2006. Available at http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/ comments/800-38_Series-Drafts/GCM/Joux_comments.pdf. Eik List and Mridul Nandi. ZMAC+ - An Efficient Variable-output-length Variant of ZMAC. IACR Trans. Symmetric Cryptol., 2017(4):306–325, 2017.
BBB Secure MACs January 2018 41 / 44
References
Stefan Lucks. The Sum of PRPs Is a Secure PRF. In Bart Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of LNCS, pages 470–484. Springer, 2000. Kazuhiko Minematsu and Tetsu Iwata. Tweak-Length Extension for Tweakable Blockciphers. In Jens Groth, editor, Cryptography and Coding - IMACC 2015, volume 9496 of LNCS, pages 77–93. Springer, 2015. Bart Mennink and Samuel Neves. Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory. In Jonathan Katz and Hovav Shacham, editors, Advances in Cryptology - CRYPTO 2017 (Proceedings, Part III), volume 10403 of LNCS, pages 556–583. Springer,
Yusuke Naito. Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher. In Man Ho Au and Atsuko Miyaji, editors, ProvSec 2015, volume 9451 of LNCS, pages 167–182. Springer, 2015.
BBB Secure MACs January 2018 42 / 44
References
Yusuke Naito. Blockcipher-Based MACs: Beyond the Birthday Bound Without Message Length. In Tsuyoshi Takagi and Thomas Peyrin, editors, Advances in Cryptology - ASIACRYPT 2017 (Proceedings, Part III), volume 10626 of LNCS, pages 446–470. Springer, 2017. Jacques Patarin. Security of Random Feistel Schemes with 5 or More
CRYPTO 2004, volume 3152 of LNCS, pages 106–122. Springer, 2004. Jacques Patarin. A Proof of Security in O(2n) for the Xor of Two Random
Security - ICITS 2008, volume 5155 of LNCS, pages 232–248. Springer,
Phillip Rogaway. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. In Pil Joong Lee, editor, Advances in Cryptology - ASIACRYPT 2004, volume 3329 of LNCS, pages 16–31. Springer, 2004.
BBB Secure MACs January 2018 43 / 44
References
Victor Shoup. On Fast and Provably Secure Message Authentication Based on Universal Hashing. In Neal Koblitz, editor, Advances in Cryptology - CRYPTO ’96, volume 1109 of LNCS, pages 313–328. Springer, 1996. Mark N. Wegman and Larry Carter. New Hash Functions and Their Use in Authentication and Set Equality. J. Comput. Syst. Sci., 22(3):265–279, 1981. Kan Yasuda. A New Variant of PMAC: Beyond the Birthday Bound. In Phillip Rogaway, editor, Advances in Cryptology - CRYPTO 2011, volume 6841 of LNCS, pages 596–609. Springer, 2011.
BBB Secure MACs January 2018 44 / 44