Different Features of ELmD, EME Based Authenticated Encryption - - PowerPoint PPT Presentation

different features of elmd eme based authenticated
SMART_READER_LITE
LIVE PREVIEW

Different Features of ELmD, EME Based Authenticated Encryption - - PowerPoint PPT Presentation

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs Different Features of ELmD, EME Based Authenticated Encryption Schemes Nilanjan Datta and Mridul Nandi Indian


slide-1
SLIDE 1

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Different Features of ELmD, EME Based Authenticated Encryption Schemes

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata August 24, 2014 DIAC, UCSB

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-2
SLIDE 2

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Outline

1 ELmD Authenticated Encryption Scheme 2 EME based Authenticated Encryption Schemes 3 Comparative Study of ELmD with other EME

based AEs

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-3
SLIDE 3

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Design Structure of ELmD

1 Process Associated Data in PMAC like structure. 2 Process Message in the paradigm of Encrypt-Mix-Encrypt

(e.g., COPA).

3 Expand the plaintext by applying checksum (xor of all

message blocks). This leads ciphertext expansion.

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-4
SLIDE 4

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

ELmD AE Scheme: Processing of AD

b b

EK ρ D[0] D[d] = D∗[d] 3L 2d−1 · 3L W ′[d] Z[0] Z[d] W ′[1] EK ρ D[1] Z[1] W ′[2]

b

2 · 3L EK ρ IV

b b

EK ρ D[0] D[d] = D∗[d]||10∗ 3L 7 · 2d−2 · 3L W ′[d] Z[0] Z[d] W ′[1] EK ρ D[1] Z[1] W ′[2]

b

2 · 3L EK ρ IV Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-5
SLIDE 5

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

ELmD AE Scheme: Processing of Plaintext

EK ρ M[2] 2L X[2] Y [2] W[1] W[2] C[2] 322it+i−1L

b

EK E−1

K

ρ M[it] X[it] Y [it] C[it] W[it − 1] 2it−1L W[it] E−1

K

T[i] 322it+iL C[1] EK ρ M[l + 1] 2lL W[l] X[l + 1] 01271 E−1

K

C[l + 1] 322l+hL

b

EK E−1

K

ρ M[1] L X[1] Y [1] IV 32L 322L E−1

K

b b b

EK ρ M[l] 2l−1L W[l − 1] X[l] E−1

K

C[l] 322l+h−1L

b

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-6
SLIDE 6

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Description of ρ function

W X W ′ = X + αW Y = X + (α + 1)W ρ

Used to provide online linear mix function Y [j] = X[j]+(α+1)X[j −1]+. . .+αj−2(α+1)X[1]+αj−1(α+1)IV

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-7
SLIDE 7

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Parameters of ELmD

1 We use AES as a blockcipher EK in the second layer.

However, we make a choice of 5 or ten rounds of AES in the first layer.

2 We have provisions of intermediate tag (if required). 3 Instead of having exactly 128 bit final tags, we can provide up

to 255 bits tag (so that ciphertext size is multiple of 128). This helps in faster decryption and verification in hardware.

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-8
SLIDE 8

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Proposed Modification on Padding Rule

Submitted Padding Rule M[l] =

  • (M∗[l] || 10∗)

if |M∗[l]| = 128 M∗[l] else M[l + 1] = ⊕l

i=1M[i]

Proposed Modification M[l] =

  • (M∗[l] || 10∗) ⊕ (⊕l−1

i=1M[i])

if |M∗[l]| = 128 M∗[l] ⊕ (⊕l−1

i=1M[i])

else M[l + 1] = M[l]

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-9
SLIDE 9

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Security Claim

Goal ELmD(rd1,rd2),0,f ELmD(rd1,rd2),127,f confidentiality 62.8 62.8 integrity 62.4 62.3

Table: Table quantifying, for each of the recommended parameter sets, the intended number of bits of security : Here ((rd1, rd2), f) ∈ {((10, 10), 0), ((10, 10), 1), ((5, 10), 0), ((5, 10), 1)}.

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-10
SLIDE 10

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Security Claim

Theorem 3.1 : Advopriv

ELmD(10,10),0,f(A) ≤ η(σpriv) + 5σ2

priv

2n

. Theorem 3.2 : Advopriv

ELmD(10,10),127,f(A) ≤ η(σpriv) + 6σ2

priv

2n

Theorem 3.3 : Advauth

ELmD(10,10),0,f(A) ≤ η(σauth) + 9σ2

auth

2n

. Theorem 3.4 : Advauth

ELmD(10,10),127,f(A) ≤ η(σauth) + 11σ2

auth

2n

Here η(i) denotes the maximum AES advantage over all adversaries, making at most i queries. As full rounds of AES is used, we can assume η(i) to be negligible.

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-11
SLIDE 11

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Properties of EME based AE Schemes

Online ith block of ciphertext only depends on the first i blocks of plaintext. Nonce Misuse Resistant Cipher provides online security even if nonce is repeated. Pipeline Implementable As EME is parallel, the ciphers are expected to have the parallel nature and hence pipeline implementable.

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-12
SLIDE 12

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Examples of other AE Schemes with EME Structure

AES-COPA Marble NMR-Deoxys NMR-Joltik NMR-KIASU PRØST-COPA SHELL

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-13
SLIDE 13

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

  • No. of primitives used

d-block associated data Processing ELmD requires d many block-cipher invocations. l-block message Processing ELmD requires 2l + 2 many block-cipher invocations. l-block message Processing (final block incomplete) Doesn’t use of XLS or tag splitting. Similar treatment for incomplete, complete blocks and even when the number of blocks is one.

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-14
SLIDE 14

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Parallelism and Uniformity

Processing of Message Similar processing of message for full and incomplete final block messages. Processing of Message and Ciphertext Similar processing for both encryption and decryption. It would help to have low area combined implementation in hardware. Processing of Associated Data Similar processing of associated data. No bottleneck for the last block.

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-15
SLIDE 15

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Performance of ELmE

Hardware Implementation Enc-Dec Combined hardware implementation area is minimized.

Type Is final Type Is complete

mask2

J JJ R S Q QQ

mix

W

b b b

K[0] K[10] RD RD−1

b b b

K[10] K[0] Type Is complete

mask1

δ1 δ2

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-16
SLIDE 16

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Limited Buffer Scenario

Issues of Limited Buffer Low end devices has limited buffer. It may has to release unverified plaintext during decryption. INT-RUP Security Adversary has access to unverified decryption oracle. OCB, AES-COPA: INT-RUP insecure. Does not work in straightforward manner for ELmD. Solution: Intermediate Tag stops releasing unverified plaintext.

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-17
SLIDE 17

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

ELmD: Flexibility

EK ρ M[2] 2L X[2] Y [2] W[1] W[2] C[2] 322it+i−1L

b

EK E−1

K

ρ M[it] X[it] Y [it] C[it] W[it − 1] 2it−1L W[it] E−1

K

T[i] 322it+iL C[1] EK ρ M[l + 1] 2lL W[l] X[l + 1] 01271 E−1

K

C[l + 1] 322l+hL

b

EK E−1

K

ρ M[1] L X[1] Y [1] IV 32L 322L E−1

K

b b b

EK ρ M[l] 2l−1L W[l − 1] X[l] E−1

K

C[l] 322l+h−1L

b

Use as Online Encryption/Decryption only Scheme Set associated data as empty and IV = 1. Return C[1..e].

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-18
SLIDE 18

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

ELmD: Flexibility

EK ρ M[2] 2L X[2] Y [2] W[1] W[2] C[2] 322it+i−1L

b

EK E−1

K

ρ M[it] X[it] Y [it] C[it] W[it − 1] 2it−1L W[it] E−1

K

T[i] 322it+iL C[1] EK ρ M[l + 1] 2lL W[l] X[l + 1] 01271 E−1

K

C[l + 1] 322l+hL

b

EK E−1

K

ρ M[1] L X[1] Y [1] IV 32L 322L E−1

K

b b b

EK ρ M[l] 2l−1L W[l − 1] X[l] E−1

K

C[l] 322l+h−1L

b

Use as MAC only Set Associated data empty and IV = 1. Return (M, T).

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-19
SLIDE 19

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

ELmD: Flexibility

EK ρ M[2] 2L X[2] Y [2] W[1] W[2] C[2] 322it+i−1L

b

EK E−1

K

ρ M[it] X[it] Y [it] C[it] W[it − 1] 2it−1L W[it] E−1

K

T[i] 322it+iL C[1] EK ρ M[l + 1] 2lL W[l] X[l + 1] 01271 E−1

K

C[l + 1] 322l+hL

b

EK E−1

K

ρ M[1] L X[1] Y [1] IV 32L 322L E−1

K

b b b

EK ρ M[l] 2l−1L W[l − 1] X[l] E−1

K

C[l] 322l+h−1L

b

Use to check integrity of associated data only Set message as empty and checksum M[1] = 0. Return (D, T).

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption

slide-20
SLIDE 20

ELmD Authenticated Encryption Scheme EME based Authenticated Encryption Schemes Comparative Study of ELmD with other EME based AEs

Questions and Comments

Nilanjan Datta and Mridul Nandi Indian Statistical Institute, Kolkata Different Features of ELmD, EME Based Authenticated Encryption