cryptanalysis of eax prime
play

Cryptanalysis of EAX Prime Kazuhiko Minematsu, NEC Corporation - PowerPoint PPT Presentation

Cryptanalysis of EAX Prime Kazuhiko Minematsu, NEC Corporation Stefan Lucks, Bauhaus Universitt Weimar Hiraku Morita, Nagoya University Tetsu Iwata, Nagoya University DIAC, Directions in Authenticated Ciphers July 5 6, 2012,


  1. Cryptanalysis of EAX ‐ Prime Kazuhiko Minematsu, NEC Corporation Stefan Lucks, Bauhaus ‐ Universität Weimar Hiraku Morita, Nagoya University Tetsu Iwata, Nagoya University DIAC, Directions in Authenticated Ciphers July 5 ‐‐ 6, 2012, Stockholm, Sweden 1

  2. EAX ‐ Prime (EAX’) • Authenticated encryption based on AES • Standard security function for the Smart Grid – ANSI C12.22 ‐ 2008 • proposed by Moise, Beroset, Phinney, and Burns to NIST in 2011 • NIST announcement: “Future Parts: NIST is planning to develop two additional parts to the 800 ‐ 38 series of Special Publications. One will specify schemes for format preserving encryption based on the FFX framework, and the other will specify the EAX’ mode for authenticated encryption, in support of Smart Grid.” 2

  3. Overview of Our Results • forgery attack • chosen plaintext distinguisher • chosen ciphertext message recovery attack 3

  4. EAX and EAX ‐ Prime • EAX – an authenticated encryption proposed by Bellare, Rogaway, and Wagner at FSE 2004 – has a proof of security • EAX ‐ prime – modified version of EAX to optimize the number of blockcipher calls and the size of memory – no formal analysis 4

  5. EAX N (nonce) P (plaintext) H (header) CMAC CMAC N (IV for CTR) CTR mode encryption C (ciphertext) CMAC CMAC has to be tweaked T (tag) 5

  6. EAX ‐ Prime N (cleartext) P (plaintext) cleartext = nonce + header CMAC N (IV for CTR) CTR mode encryption C (ciphertext) CMAC CMAC has to be tweaked T (tag) (truncated to 32 bits) 6

  7. CMAC [NIST SP 800 ‐ 38B] P[1] P[2] P[m ‐ 1] P[m] || 10…0 2E K (0 n )=D or … 4E K (0 n )=Q E K E K E K E K CMAC K (P) MAC, variable ‐ input length PRF • 2E K (0 n ) : ``doubling” of E K (0 n ) in GF(2 n ) • 4E K (0 n ) : 2(2E K (0 n )) • 7

  8. Tweaked CMAC in EAX Tweak t P[1] P[m ‐ 1] P[m] || 10…0 2E K (0 n )=D or … 4E K (0 n )=Q E K E K E K E K t = 0…0 or 0…01 or 0…010 CMAC K [t](P) 8

  9. Tweaked CMAC in EAX Tweak P[1] P[m ‐ 1] P[m] || 10…0 E K (0 n ) or 2E K (0 n )=D E K (0 n ‐ 1 1) or … or 4E K (0 n )=Q E K (0 n ‐ 2 10) E K E K E K t = 0…0 or 0…01 or 0…010 CMAC K [t](P) 9

  10. Tweaked CMAC in EAX ‐ Prime Tweak P[1] P[m ‐ 1] P[m] || 10…0 D=2E K (0 n ) 2E K (0 n )=D or or … Q=4E K (0 n ) 4E K (0 n )=Q E K E K E K CMAC K [t](P) • CMAC[D]: Tweaked CMAC with D=2E K (0 n ) • CMAC[Q]: Tweaked CMAC with Q=4E K (0 n ) 10

  11. EAX ‐ Prime N (cleartext) P (plaintext) CMAC[D] N (IV for CTR) CTR mode encryption C (ciphertext) CMAC[Q] there are other minor changes T (tag) (truncated to 32 bits) 11

  12. Observations on CMAC[D] and CMAC[Q] P[1] P[m ‐ 1] P[m] || 10…0 D=2E K (0 n ) 2E K (0 n )=D or or … Q=4E K (0 n ) 4E K (0 n )=Q E K E K E K CMAC K [t](P) CMAC[D] when |P|=n CMAC[Q] when 0 ≤ |P|<n P P||10…0 D=2E K (0 n ) 2E K (0 n )=D Q=4E K (0 n ) 4E K (0 n )=Q E K E K 12 CMAC K [D](P)=E K (P) CMAC K [Q](P)= E K (P||10…0)

  13. Forgery Attack 1. Let (N,C,T) be |N|=n N (cleartext) P (plaintext) • |C|<n and C||10…0 = N • T=0 32 • CMAC[D] 2. Ask (N,C,T) to the decryption oracle E K (N) N (IV for CTR) CTR mode encryption succeeds with probability 1 (without making any encryption C (ciphertext) queries) CMAC[Q] E K (C||10…0)=E K (N) 0 32 = T (tag) (truncated to 32 bits) 13

  14. Distinguishing Attack 1. Let (N,P) be N=10…0, |N|=n N (cleartext) P (plaintext) • |P|=0 (empty string) • 2. Ask (N,P) to the CMAC[D] encryption oracle and obtain (C,T) E K (N)=E K (10…0) 3. output 1 if T=0 32 N (IV for CTR) CTR mode encryption output 0 otherwise T=0 32 with probability C (ciphertext) 1 for the encryption oracle empty string= • 1/2 32 for the random oracle • CMAC[Q] succeeds with a high probability E K (C||10…0)=E K (10…0) (with one encryption query) 0 32 = T (tag) (truncated to 32 bits) 14

  15. Chosen Ciphertext Message Recovery K K (N* , C* , T*) P* Alice Bob Adversary Consider (N*, C* , T*) • – the corresponding P* is unknown to the adversary – the adversary eavesdrops (N*, C* , T*) The adversary can ask (N , C , T) to a decryption oracle • The goal is to find (a part of) P* • 15

  16. Chosen Ciphertext Message Recovery K K (N* , C* , T*) P* Alice Bob (N , C , T) P / ⊥ P* Adversary Consider (N*, C* , T*) • – the corresponding P* is unknown to the adversary – the adversary eavesdrops (N*, C* , T*) The adversary can ask (N , C , T) to a decryption oracle • The goal is to find (a part of) P* • 16

  17. Chosen Ciphertext Message Recovery 1. Suppose (N*,C*,T*) satisfies |N*|=n 2. Let (N, C, T) be N* (cleartext) P (plaintext) N=N* • |C|<n and C||10…0 = N* • CMAC[D] T=0 32 • 3. Ask (N*, C , T) to the dec. oracle E K (N*) 4. Let P be the answer N (IV for CTR) CTR mode encryption 5. C xor P is the keystream for N* C (ciphertext) first |C| bits of P* = (first |C| bits of C*) xor (C xor P) CMAC[Q] E K (C||10…0)=E K (N*) succeeds with probability 1 0 32 = T (tag) (truncated to 32 bits) 17

  18. Applicability to the ANSI C12.22 Protocol • The attacks can be slightly generalized to handle other input lengths • None of our attacks works if |N| > n – we do not know if |N| > n is guaranteed in ANSI C12.22 specification • The attacks can be avoided if |N| > n is “guaranteed” – should be actively checked by the decryption side – even if |N| > n is stated in the specification, this does not prevent a malicious adversary from using |N| ≤ n 18

  19. Practical Implication* • EAX ‐ prime is intended for smart grid applications – it hardly seems reasonable to assume that every device will always carefully check the lengths of the input data • Forgery attacks allow a malicious adversary to create a large number of valid short messages – possibly result in random ‐ looking commands – practical implication depends on what the actual device will do with valid and random commands * Thanks to Greg Rose for discussions on this point. 19

  20. Discussions What went wrong? • – Compared to EAX (among other changes), EAX ‐ prime changes the “key dependent constant” • reduces the number of blockcipher calls – This is generally a dangerous sign as the original scheme is usually designed to optimize the number of calls – Sometimes changing the “key ‐ independent constant” may break the provable security result • e.g., in GCM, when |N| = 96, IV = N || 0…01 • changing this to IV = N || 0…0 results in an insecure scheme • seemingly a minor modification may result in an insecure scheme 20

  21. Discussions • It seems difficult to formalize “what can safely be changed” • General advice: If the existing scheme is modified, – entire security proof should be revisited (ask cryptographers) – or, do not modify the existing scheme 21

  22. Conclusion and Open Question • EAX ‐ prime allows forgery attacks, chosen plaintext distinguishing attacks, and chosen ciphertext message recovery attacks • The changes break the provable security results of EAX – EAX ‐ prime is cryptographically broken as a general purpose authenticated encryption – Our attacks do not work on EAX (a proof of security) • Open question: – prove or disprove the security of EAX ‐ prime if |N| > n 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend