Generic security of the Keyed Sponge based on joint work with Guido - - PowerPoint PPT Presentation

generic security of the keyed sponge
SMART_READER_LITE
LIVE PREVIEW

Generic security of the Keyed Sponge based on joint work with Guido - - PowerPoint PPT Presentation

Generic security of the Keyed Sponge Generic security of the Keyed Sponge based on joint work with Guido Bertoni 1 , Michal Peeters 1 , Gilles Van Assche 1 , ArcticCrypt Longyearbyen July 19, 2016 1 / 30 Joan Daemen 1 , 2 Elena Andreeva 3


slide-1
SLIDE 1

Generic security of the Keyed Sponge

Generic security of the Keyed Sponge

Joan Daemen1,2 based on joint work with Guido Bertoni1, Michaël Peeters1, Gilles Van Assche1, Elena Andreeva3 and Bart Mennink3

1STMicroelectronics 2Radboud University 3COSIC KULeuven

ArcticCrypt Longyearbyen July 19, 2016

1 / 30

slide-2
SLIDE 2

Generic security of the Keyed Sponge

Outline

1 Sponge 2 Keyed sponge 3 Beyond birthday-bound security 4 Keyed sponge, refactored

2 / 30

slide-3
SLIDE 3

Generic security of the Keyed Sponge Sponge

Outline

1 Sponge 2 Keyed sponge 3 Beyond birthday-bound security 4 Keyed sponge, refactored

3 / 30

slide-4
SLIDE 4

Generic security of the Keyed Sponge Sponge

RadioGatún [Keccak team, NIST 2nd hash workshop 2006]

XOF: eXtendable Output Function Problem: expressing security claim Search for random oracle but then with inner collisions

4 / 30

slide-5
SLIDE 5

Generic security of the Keyed Sponge Sponge

(Early) Sponge at Dagstuhl, January 2007

Screenshot:

5 / 30

slide-6
SLIDE 6

Generic security of the Keyed Sponge Sponge

Generic security of Sponge [KT, Ecrypt hash, September 2007 ]

Random sponges:

T-sponge: f is random transformation P-sponge: f is random permutation

Theorem: if no inner collisions, output is uniformly random

inner collision: different inputs leading to same inner state Probability of inner collision:

2−c−1M2 with M : # calls to f

6 / 30

slide-7
SLIDE 7

Generic security of the Keyed Sponge Sponge

Promoting sponge from reference to usage (2007-2008)

RadioGatún cryptanalysis (1st & 3rd party): not promising NIST SHA-3 deadline approaching …U-turn Sponge with strong permutation f: Keccak [KT, SHA-3, 2008]

M pad trunc Z

  • uter

inner r c f f f f f f absorbing squeezing

7 / 30

slide-8
SLIDE 8

Generic security of the Keyed Sponge Sponge

Distinguishing random sponge from random oracle

Distinguishing advantage: 2−c−1M2 Problem: in real world, adversary has access to f

8 / 30

slide-9
SLIDE 9

Generic security of the Keyed Sponge Sponge

Differentiating random sponge from random oracle

Indifferentiability framework [Maurer, Renner & Holenstein, 2004] Applied to hashing [Coron, Dodis, Malinaud & Puniya, 2005] Random oracle augmented with simulator for sake of proof Differentiating advantage: 2−c−1M2 [KT, Eurocrypt 2008]

9 / 30

slide-10
SLIDE 10

Generic security of the Keyed Sponge Keyed sponge

Outline

1 Sponge 2 Keyed sponge 3 Beyond birthday-bound security 4 Keyed sponge, refactored

10 / 30

slide-11
SLIDE 11

Generic security of the Keyed Sponge Keyed sponge

Message authentication codes

f f Key … Padded message f f f MAC

11 / 30

slide-12
SLIDE 12

Generic security of the Keyed Sponge Keyed sponge

Stream encryption

f f Key IV f Key stream

Long output stream per IV: similar to OFB mode Short output stream per IV: similar to counter mode

12 / 30

slide-13
SLIDE 13

Generic security of the Keyed Sponge Keyed sponge

Authenticated encryption: spongeWrap [KT, SAC 2011]

f f Key … Padded message IV f Key stream f f MAC

Adopted by several CAESAR candidates But this is no longer sponge

13 / 30

slide-14
SLIDE 14

Generic security of the Keyed Sponge Keyed sponge

The duplex construction [KT, SAC 2011]

r c

  • uter

inner initialize pad trunc f duplexing σ0 Z0 pad trunc f duplexing σ1 Z1 pad trunc f duplexing σ2 Z2 …

Generic security equivalent to that of sponge

14 / 30

slide-15
SLIDE 15

Generic security of the Keyed Sponge Keyed sponge

Keyed sponge: distinguishing setting

Straightforward bound: 2−c−1M2 + 2−kM Security strength s: expected complexity of succesful attack

strength s means attack complexity 2s bounds can be converted to security strength statements

Here: s ≥ min(c/2, k)

e.g., s = 128 requires c = 256 and k = 128 c/2: birthday bound

15 / 30

slide-16
SLIDE 16

Generic security of the Keyed Sponge Beyond birthday-bound security

Outline

1 Sponge 2 Keyed sponge 3 Beyond birthday-bound security 4 Keyed sponge, refactored

16 / 30

slide-17
SLIDE 17

Generic security of the Keyed Sponge Beyond birthday-bound security

More fine-grained attack complexity

Splitting attack complexity:

queries to construction: data complexity M queries to f or f−1: computational complexity N

Our ambition around 2010: 2−c−1M2 + 2−cNM + 2−kN If we limit data complexity M ≤ 2a ≪ 2c/2:

s ≥ min(c − a, k) e.g., s = 128 and a = 64 require c = 192 and k = 128

17 / 30

slide-18
SLIDE 18

Generic security of the Keyed Sponge Beyond birthday-bound security

Intuition behind 2−cNM

success probability per guess: 2−c

18 / 30

slide-19
SLIDE 19

Generic security of the Keyed Sponge Beyond birthday-bound security

Intuition behind 2−cNM

µ ≤ M instances with same partial r-bit input success probability per guess: µ2−c

19 / 30

slide-20
SLIDE 20

Generic security of the Keyed Sponge Beyond birthday-bound security

Intuition behind 2−cNM

µ ≤ M instances with same partial r-bit input success probability per guess: µ2−c

19 / 30

slide-21
SLIDE 21

Generic security of the Keyed Sponge Beyond birthday-bound security

Intuition behind 2−cNM

µ ≤ M instances with same partial r-bit input success probability per guess: µ2−c

19 / 30

slide-22
SLIDE 22

Generic security of the Keyed Sponge Beyond birthday-bound security

An initial attempt [KT, SKEW 2011]

bound: 2−c−1M2 + 2−c+1NM + 2−kN Problems and limitations

bound did not cover multi-target (key) attacks proof did not convince reviewers new variant (a.o. in CAESAR): inner-keyed sponge:

M pad trunc Z

  • uter

inner K r c f f f f f f absorbing squeezing

20 / 30

slide-23
SLIDE 23

Generic security of the Keyed Sponge Beyond birthday-bound security

[Andreeva, Daemen, Mennink, Van Assche, FSE 2015]

Inner/outer-keyed, multi-target (n), multiplicity µ Modular proof using Patarin’s H-coefficient technique Bound: 2−c−1M2 + 2−c+1µN + 2−knN + . . .

A ... KS K1 KS K2 KS Kn f

?

... RO1 RO2 ROn f

21 / 30

slide-24
SLIDE 24

Generic security of the Keyed Sponge Beyond birthday-bound security

Full-state absorbing! [Mennink, Reyhanitabar and Vizár, Asiacrypt 2015]

Absorbing on full permutation width does not degrade bounds We decided to use that insight in Keyak v2 But proven bounds had some limitations and problems:

term 2−kµN rather than 2−cµN no multi-key security multiplicity µ only known a posteriori

22 / 30

slide-25
SLIDE 25

Generic security of the Keyed Sponge Beyond birthday-bound security

Full-state absorbing! [Mennink, Reyhanitabar and Vizár, Asiacrypt 2015]

Absorbing on full permutation width does not degrade bounds We decided to use that insight in Keyak v2 But proven bounds had some limitations and problems:

term 2−kµN rather than 2−cµN no multi-key security multiplicity µ only known a posteriori

22 / 30

slide-26
SLIDE 26

Generic security of the Keyed Sponge Keyed sponge, refactored

Outline

1 Sponge 2 Keyed sponge 3 Beyond birthday-bound security 4 Keyed sponge, refactored

23 / 30

slide-27
SLIDE 27

Generic security of the Keyed Sponge Keyed sponge, refactored

The new core: (full-state) keyed duplex

± K f IV Z ¾ f Z ¾ f Z ¾ …

Full-state absorbing, no padding: |σ| = b Initial state: concatenation of key k and IV Multi-key: k selected from an array K with index δ Re-phased: f, Z, σ instead of σ, f, Z ≈ all keyed sponge functions are modes of this

24 / 30

slide-28
SLIDE 28

Generic security of the Keyed Sponge Keyed sponge, refactored

Generic security of keyed duplex: the setup

± K f IV Z ¾ f Z ¾ f Z ¾ … f x y

?

(±, IV) Path ¾ RO Z f x y

Ideal function: Ideal eXtendable Input Function (IXIF)

RO-based object with duplex interface Independent outputs Z for different paths

Further refine adversary’s capability

L: # queries to keyed duplex/RO with repeated path qIV : maxIV # init queries with different keys

25 / 30

slide-29
SLIDE 29

Generic security of the Keyed Sponge Keyed sponge, refactored

Generic security of keyed duplex: the bound

± K f IV Z ¾ f Z ¾ f Z ¾ … f x y

?

(±, IV) Path ¾ RO Z f x y

2−c−1L2 + 2−c(L + 2ν)N + 2−kqIVN + . . . with ν: chosen such that probability of ν-wise multi-collision in set

  • f M r-bit values is negligible

26 / 30

slide-30
SLIDE 30

Generic security of the Keyed Sponge Keyed sponge, refactored

Application: counter-like stream cipher

Only init calls, each taking Z as keystream block IV is nonce, so L = 0 Assume M ≪ 2r/2: ν = 1 Bound: 2−c(2ν)N + 2−kqIVN + . . . Strength: s ≥ min(c − 1, k − log2(qIV))

27 / 30

slide-31
SLIDE 31

Generic security of the Keyed Sponge Keyed sponge, refactored

Application: lightweight MAC

Message padded and fed via IV and σ blocks t-bit tag, squeezed in chunks of r bits: c = b − r adversary chooses IV so L ≈ M = 2a qIV is total number of keys n Bound: 2−c−1M2 + 2−c+1MN + 2−knN + . . . Strength: s ≥ min(b − a − r − 1, k − log2(n)) Imposes a minimum width of the permutation: b > s + a + r

28 / 30

slide-32
SLIDE 32

Generic security of the Keyed Sponge Keyed sponge, refactored

Application: Motorist AE session mode

SUV 1 T(0) A(1) P(1) C(1) T(1) P(2) C(2) T(2) A(3) T(3)

Used in Keyak v2 [KT & Ronny Van Keer, 2015] Plaintext absorbed in outer part, AD in inner part also Used in Keyak with c = 256 and b = 1600 or b = 800 Rate 544 or 1344 so we can take ν = 1 bounds:

nonce-respecting: 2−c+1N + 2−kqIVN + . . . nonce-violating: 2−cMN + 2−kqIVN + . . .

29 / 30

slide-33
SLIDE 33

Generic security of the Keyed Sponge Conclusions

Conclusions

Quite some evolution in keyed sponge New results (in submission)

appropriate keyed-sponge primitive: (full-state) keyed duplex flexible bound covering many use cases makes life easier for sponge mode designer

Thanks for your attention!

30 / 30