Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded - - PowerPoint PPT Presentation

deck based wide block cipher modes and an exposition of
SMART_READER_LITE
LIVE PREVIEW

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded - - PowerPoint PPT Presentation

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model Aldo Gunsing, Joan Daemen and Bart Mennink FSE 2020 1 / 15 Block cipher K n n P B C Plaintext P encrypted to ciphertext C with secret key K


slide-1
SLIDE 1

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

Aldo Gunsing, Joan Daemen and Bart Mennink FSE 2020

1 / 15

slide-2
SLIDE 2

Block cipher

B P K C n n ◮ Plaintext P encrypted to ciphertext C with secret key K ◮ Fixed block size

2 / 15

slide-3
SLIDE 3

Block cipher

B P K C n n ◮ Plaintext P encrypted to ciphertext C with secret key K ◮ Fixed block size ◮ In order to encrypt variable sized messages, we need a mode of operation ◮ These modes require a nonce, which has to be stored

2 / 15

slide-4
SLIDE 4

Wide block cipher

B P K C ∗ ∗ ◮ Alternatively, we can design a wide block cipher ◮ A wide block cipher is a block cipher with a variable block size

3 / 15

slide-5
SLIDE 5

Wide block cipher

B P K C ∗ ∗ ◮ Alternatively, we can design a wide block cipher ◮ A wide block cipher is a block cipher with a variable block size ◮ No nonce needed, as every part of the output ideally depends on every part of the input

3 / 15

slide-6
SLIDE 6

Tweakable wide block cipher

B P K C W ∗ ∗ ◮ A tweakable wide block cipher additionally has a tweak ◮ Tweak W public, ciphertext completely changes with a different tweak

4 / 15

slide-7
SLIDE 7

Tweakable wide block cipher

B P K C W ∗ ∗ ◮ A tweakable wide block cipher additionally has a tweak ◮ Tweak W public, ciphertext completely changes with a different tweak ◮ Useful for e.g. disk encryption, where every sector gets its own tweak

4 / 15

slide-8
SLIDE 8

Our contribution

We build two tweakable wide block ciphers based on two primitives:

5 / 15

slide-9
SLIDE 9

Our contribution

We build two tweakable wide block ciphers based on two primitives: ◮ Doubly-extendable cryptographic keyed (deck) functions:

◮ Input: any size ◮ Output: arbitrarily long

5 / 15

slide-10
SLIDE 10

Our contribution

We build two tweakable wide block ciphers based on two primitives: ◮ Doubly-extendable cryptographic keyed (deck) functions:

◮ Input: any size ◮ Output: arbitrarily long

◮ Keyed hashes:

◮ Input: any size ◮ Output: fixed size

5 / 15

slide-11
SLIDE 11

Our contribution

We build two tweakable wide block ciphers based on two primitives: ◮ Doubly-extendable cryptographic keyed (deck) functions:

◮ Input: any size ◮ Output: arbitrarily long

◮ Keyed hashes:

◮ Input: any size ◮ Output: fixed size

In contrast to block ciphers, these primitives are not necessarily invertible, which allows for a more flexible design

5 / 15

slide-12
SLIDE 12

Double-decker

VL YL UR XR FK1 FK2 HK W UL HK XL VR YR

6 / 15

slide-13
SLIDE 13

Double-decker

VL YL UR XR FK1 FK2 HK W UL HK XL VR YR ◮ Generalization of Farfalle-WBC by Bertoni et al. (2017) ◮ Feistel-like structure

6 / 15

slide-14
SLIDE 14

Double-decker

VL YL UR XR FK1 FK2 HK W UL HK XL VR YR ◮ Generalization of Farfalle-WBC by Bertoni et al. (2017) ◮ Feistel-like structure ◮ Two keyed hashes on the outside, two deck functions on the inside – hence the name

6 / 15

slide-15
SLIDE 15

Double-decker

VL YL UR XR FK1 FK2 HK W UL HK XL VR YR n ∗ ∗ n n ∗ ∗ n ◮ Generalization of Farfalle-WBC by Bertoni et al. (2017) ◮ Feistel-like structure ◮ Two keyed hashes on the outside, two deck functions on the inside – hence the name ◮ Outer lanes of fixed size ◮ Inner lanes of variable size

6 / 15

slide-16
SLIDE 16

Docked-double-decker

V Z U Y FK1 FK2 HK W T HK X

7 / 15

slide-17
SLIDE 17

Docked-double-decker

V Z U Y FK1 FK2 HK W T HK X ◮ Variant of double-decker ◮ One lane less

7 / 15

slide-18
SLIDE 18

Docked-double-decker

V Z U Y FK1 FK2 HK W T HK X n ∗ n n ∗ n ◮ Variant of double-decker ◮ One lane less ◮ Outer lanes of fixed size ◮ Inner lane of variable size

7 / 15

slide-19
SLIDE 19

Docked-double-decker

V Z U Y FK1 FK2 HK W T HK X n ∗ n n ∗ n ◮ Variant of double-decker ◮ One lane less ◮ Outer lanes of fixed size ◮ Inner lane of variable size ◮ Deck functions get fixed sized input, so they conceptually become stream ciphers

7 / 15

slide-20
SLIDE 20

XOR-universality

◮ A keyed hash H is ε-XOR-universal if for all x = x′ and y P[HK(x) ⊕ HK(x′) = y] ε

8 / 15

slide-21
SLIDE 21

XOR-universality

◮ A keyed hash H is ε-XOR-universal if for all x = x′ and y P[HK(x) ⊕ HK(x′) = y] ε ◮ This conventional property only considers the XOR-difference between a single query pair

8 / 15

slide-22
SLIDE 22

XOR-universality

◮ A keyed hash H is ε-XOR-universal if for all x = x′ and y P[HK(x) ⊕ HK(x′) = y] ε ◮ This conventional property only considers the XOR-difference between a single query pair ◮ For q queries the bound becomes q

2

  • ε

8 / 15

slide-23
SLIDE 23

XOR-universality

◮ A keyed hash H is ε-XOR-universal if for all x = x′ and y P[HK(x) ⊕ HK(x′) = y] ε ◮ This conventional property only considers the XOR-difference between a single query pair ◮ For q queries the bound becomes q

2

  • ε

◮ However:

◮ ε is the worst-case bound on all possible x = x′ ◮ For some functions not all query pairs have similar probabilities

8 / 15

slide-24
SLIDE 24

Blinded keyed hash

◮ We consider blinded keyed hash (bkh) security to achieve a more accurate estimate when multiple queries are taken into account

9 / 15

slide-25
SLIDE 25

Blinded keyed hash

◮ We consider blinded keyed hash (bkh) security to achieve a more accurate estimate when multiple queries are taken into account ◮ The keyed hash function H is bkh secure if it is indistinguishable in the following setup RO1 RO2 HK X X ∆ ∆

9 / 15

slide-26
SLIDE 26

Example: Xoofffie

Xoofffie XOR-universal bkh single query tuple 2−127 2−127 q queries q

2

  • · 2−127

q · 2−128 ◮ Red bounds are claimed, black bound follows from XOR-universality

10 / 15

slide-27
SLIDE 27

Example: Xoofffie

Xoofffie XOR-universal bkh single query tuple 2−127 2−127 q queries q

2

  • · 2−127

q · 2−128 ◮ Red bounds are claimed, black bound follows from XOR-universality ◮ Using Xoofffie as XOR-universal hash: claimed security guarantee of 64 bits ◮ Using Xoofffie as bkh: claimed security guarantee of 128 bits

10 / 15

slide-28
SLIDE 28

Security results

◮ We cannot apply the bkh model directly to our construction

◮ The real difficulty is to reduce to the bkh model ◮ For XOR-universality this was trivial

11 / 15

slide-29
SLIDE 29

Security results

◮ We cannot apply the bkh model directly to our construction

◮ The real difficulty is to reduce to the bkh model ◮ For XOR-universality this was trivial

◮ We show that the double-deckers are secure when:

◮ The keyed hash H is bkh secure ◮ The deck function F is prf secure

11 / 15

slide-30
SLIDE 30

Security results

◮ We cannot apply the bkh model directly to our construction

◮ The real difficulty is to reduce to the bkh model ◮ For XOR-universality this was trivial

◮ We show that the double-deckers are secure when:

◮ The keyed hash H is bkh secure ◮ The deck function F is prf secure

◮ Furthermore, by applying the tweak to the deck functions the bound of H becomes tweak-separated

◮ Deck functions behave independently for different tweaks ◮ Significantly improves security bound for certain settings

11 / 15

slide-31
SLIDE 31

Power of tweak-separation

◮ Consider a ε-XOR-universal keyed hash function H ◮ Consider q queries and qW queries with tweak W loss on H naive actual general bound q

2

  • ε
  • ne tweak

q

2

  • ε

no tweak repetitions q

2

  • ε

12 / 15

slide-32
SLIDE 32

Power of tweak-separation

◮ Consider a ε-XOR-universal keyed hash function H ◮ Consider q queries and qW queries with tweak W loss on H naive actual general bound q

2

  • ε
  • W

qW

2

  • ε
  • ne tweak

q

2

  • ε

q

2

  • ε

no tweak repetitions q

2

  • ε

12 / 15

slide-33
SLIDE 33

Applying to disk encryption on SSDs

◮ Double-decker is very suitable for disk encryption

◮ Disks are separated in sectors ◮ Block size is equal to the sector size ◮ Physical sector number used as tweak

13 / 15

slide-34
SLIDE 34

Applying to disk encryption on SSDs

◮ Double-decker is very suitable for disk encryption

◮ Disks are separated in sectors ◮ Block size is equal to the sector size ◮ Physical sector number used as tweak

◮ The sectors in SSDs have a limited lifetime as they get damaged every time data is written ◮ The Kingston UV500 960 GB has N = 228 sectors, where every sector can be written at most ≈ 500 times

13 / 15

slide-35
SLIDE 35

Applying to disk encryption on SSDs

◮ Double-decker is very suitable for disk encryption

◮ Disks are separated in sectors ◮ Block size is equal to the sector size ◮ Physical sector number used as tweak

◮ The sectors in SSDs have a limited lifetime as they get damaged every time data is written ◮ The Kingston UV500 960 GB has N = 228 sectors, where every sector can be written at most ≈ 500 times ◮ Without tweak-separation secure when 2 500N

2

  • ε ≈ 274ε ≪ 1

◮ With tweak-separation this improves to 2N 500

2

  • ε ≈ 246ε ≪ 1

13 / 15

slide-36
SLIDE 36

Comparison with Adiantum

U V HK BK1 W FK2 HK X Y ∗ n ∗ n

Adiantum (FSE 2019) V Z U Y FK1 FK2 HK W T HK X n ∗ n n ∗ n Docked-double-decker

14 / 15

slide-37
SLIDE 37

Conclusion

◮ We introduced (docked-)double-decker, two tweakable wide block ciphers based on deck functions and keyed hash functions

15 / 15

slide-38
SLIDE 38

Conclusion

◮ We introduced (docked-)double-decker, two tweakable wide block ciphers based on deck functions and keyed hash functions ◮ We also introduced the security model bkh for keyed hashes as a generalization of XOR-universality

15 / 15

slide-39
SLIDE 39

Conclusion

◮ We introduced (docked-)double-decker, two tweakable wide block ciphers based on deck functions and keyed hash functions ◮ We also introduced the security model bkh for keyed hashes as a generalization of XOR-universality ◮ Using this model we were able to prove better bounds if one uses keyed hashes like Xoofffie

15 / 15

slide-40
SLIDE 40

Conclusion

◮ We introduced (docked-)double-decker, two tweakable wide block ciphers based on deck functions and keyed hash functions ◮ We also introduced the security model bkh for keyed hashes as a generalization of XOR-universality ◮ Using this model we were able to prove better bounds if one uses keyed hashes like Xoofffie ◮ Furthermore, our usage of the tweak improves security when tweaks are limited reused

15 / 15

slide-41
SLIDE 41

Conclusion

◮ We introduced (docked-)double-decker, two tweakable wide block ciphers based on deck functions and keyed hash functions ◮ We also introduced the security model bkh for keyed hashes as a generalization of XOR-universality ◮ Using this model we were able to prove better bounds if one uses keyed hashes like Xoofffie ◮ Furthermore, our usage of the tweak improves security when tweaks are limited reused

Thank you for your attention!

15 / 15