CAESAR candidate Marble Jian Guo DIAC 24 August 2014 @Santa - - PowerPoint PPT Presentation

caesar candidate marble
SMART_READER_LITE
LIVE PREVIEW

CAESAR candidate Marble Jian Guo DIAC 24 August 2014 @Santa - - PowerPoint PPT Presentation

CAESAR candidate Marble Jian Guo DIAC 24 August 2014 @Santa Barbara, CA, USA Design Goals Online Parallelizable Software oriented Decryption-misuse resistant, unverified plaintext release Nonce-misuse resistant, or


slide-1
SLIDE 1

CAESAR candidate Marble

Jian Guo

DIAC – 24 August 2014 @Santa Barbara, CA, USA

slide-2
SLIDE 2

Design Goals

◮ Online ◮ Parallelizable ◮ Software oriented ◮ Decryption-misuse resistant, unverified plaintext release ◮ Nonce-misuse resistant, or nonce-free ◮ Low setup overhead ◮ Support of extreme usecases ◮ Full security

2 / 11

slide-3
SLIDE 3

The need of “wide-pipe”

Lesson from hash function development use double or even larger internal state to avoid internal collisions

3 / 11

slide-4
SLIDE 4

Design Overview

◮ E1, E2, E3 are block-ciphers ◮ TRANS(x, y): a transition function with MDS property. ◮ ‘·’ multiplication is in GF(2128).

4 / 11

slide-5
SLIDE 5

Recommended Parameters

Choices are made to optmize the software performance:

◮ E1, E2, E3 are 4-round AES, every message block is

processed by 12 AES rounds.

◮ TRANS(x, y) = (x + y, 3 · x + y), division-free for the

inverse computation.

5 / 11

slide-6
SLIDE 6

Recommended Parameters

Choices are made to optmize the software performance:

◮ E1, E2, E3 are 4-round AES, every message block is

processed by 12 AES rounds.

◮ TRANS(x, y) = (x + y, 3 · x + y), division-free for the

inverse computation. achieve a speed of 1.6 cpb for long message and 1.7 cpb for 8KB message, tested on Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz (Haswell Family), 12 rounds AES takes 0.6 cpb only, room to improve.

5 / 11

slide-7
SLIDE 7

Recommended Parameters

Choices are made to optmize the software performance:

◮ E1, E2, E3 are 4-round AES, every message block is

processed by 12 AES rounds.

◮ TRANS(x, y) = (x + y, 3 · x + y), division-free for the

inverse computation. achieve a speed of 1.6 cpb for long message and 1.7 cpb for 8KB message, tested on Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz (Haswell Family), 12 rounds AES takes 0.6 cpb only, room to improve. Options

◮ support the use of 128-bit nonce, by prepending it to the

associated data.

5 / 11

slide-8
SLIDE 8

Recommended Parameters

Choices are made to optmize the software performance:

◮ E1, E2, E3 are 4-round AES, every message block is

processed by 12 AES rounds.

◮ TRANS(x, y) = (x + y, 3 · x + y), division-free for the

inverse computation. achieve a speed of 1.6 cpb for long message and 1.7 cpb for 8KB message, tested on Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz (Haswell Family), 12 rounds AES takes 0.6 cpb only, room to improve. Options

◮ support the use of 128-bit nonce, by prepending it to the

associated data.

◮ Better security margin with AES for E1, E2, E3, yet with a

speed of 3.0 cpb.

5 / 11

slide-9
SLIDE 9

Usecases

In addition to the usual use, Marble supports many extreme usecases:

◮ Encryption/Decryption only (opting out the tag) ◮ Integrity of associated data only. ◮ Integrity of message — MAC only (opt out the ciphertext).

6 / 11

slide-10
SLIDE 10

Security Goals

2n security, not “birthday bound”, in both nonce-respecting and nonce-misuse scenarios. Privacy 2128 Authenticity 2128

7 / 11

slide-11
SLIDE 11

Security Goals

2n security, not “birthday bound”, in both nonce-respecting and nonce-misuse scenarios. Privacy 2128 Authenticity 2128 Privacy in nonce-misuse scenario: prefixed message blocks share the same ciphertext prefix.

7 / 11

slide-12
SLIDE 12

Security Evaluations

◮ Differential/Linear Cryptanalysis: any complete path will involve

at least 12 rounds AES, with 75 active sboxes.

◮ Inner collisions: collision on single chain is NOT “detectable”;

collision on double chains requires 2n.

◮ Nandi’s attack does not apply even with complexity 2n due to the

2n-bit chain.

8 / 11

slide-13
SLIDE 13

Security Proof

We welcome security proof of Marble mode, when the three block ciphers are idealized.

9 / 11

slide-14
SLIDE 14

Future work

◮ Hardware implementations ◮ Improving the software implementations with AES-NI ◮ Implementations without AES-NI ◮ Implementations for Atmel AVR ◮ Security proof when the underlying blockciphers are ideal,

extend tag-splitting to arbitary-length message to avoid XLS.

10 / 11

slide-15
SLIDE 15

Thank you! Questions?

11 / 11