Indifferentiable Authenticated Encryption Pooya Farshim Manuel - - PowerPoint PPT Presentation

indifferentiable authenticated encryption
SMART_READER_LITE
LIVE PREVIEW

Indifferentiable Authenticated Encryption Pooya Farshim Manuel - - PowerPoint PPT Presentation

Indifferentiable Authenticated Encryption Pooya Farshim Manuel Barbosa (Porto) (CNRS & ENS) Indifferentiable Authenticated Encryption Pooya Farshim Manuel Barbosa (Porto) (CNRS & ENS) Hash Functions long & short


slide-1
SLIDE 1

Indifferentiable
 Authenticated Encryption

Manuel Barbosa 


(Porto)

Pooya Farshim

(CNRS & ENS)

slide-2
SLIDE 2

Indifferentiable
 Authenticated Encryption

Manuel Barbosa 


(Porto)

Pooya Farshim

(CNRS & ENS)

slide-3
SLIDE 3

Hash Functions

long & arbitrary short &
 random-looking SHA

slide-4
SLIDE 4

Hash Functions

long & arbitrary short &
 random-looking SHA Provably security 
 not always possible.

slide-5
SLIDE 5

Random Oracles

long & arbitrary short &
 random-looking SHA

slide-6
SLIDE 6

Random Oracles

Random Function long & arbitrary short &
 random-looking

slide-7
SLIDE 7

Random Oracles

Random Oracle long & arbitrary short &
 random-looking

slide-8
SLIDE 8

Random Oracles are Practical

๏ Public-Key Enc. (OAEP, ECIES) ๏ Signatures (PSS, FDH) ๏ TLS 1.3 ๏ Symmetric schemes ๏ …. Provable Security for 
 Many Simple & Efficient Protocols Ideal Hash

slide-9
SLIDE 9

This Talk

slide-10
SLIDE 10

This Talk

Encryption

slide-11
SLIDE 11

This Talk

Encryption Ideal Hash

slide-12
SLIDE 12

This Talk

Encryption Inherit
 all strengths Ideal Hash

slide-13
SLIDE 13

This Talk

Encryption Inherit
 all strengths Ideal Ideal Hash

slide-14
SLIDE 14

This Talk

Random Function Encryption Inherit
 all strengths Ideal Ideal Hash

slide-15
SLIDE 15

This Talk

Random Function What Object? Encryption Inherit
 all strengths Ideal Ideal Hash

slide-16
SLIDE 16

Authenticated Encryption

slide-17
SLIDE 17
  • 1. K ↞ Gen(1λ)
  • 2. C ← Enc(K,N,A,M,!) |C|=|M| + !
  • 3. M/⟘ ← Dec(K,N,A,C,!)

Authenticated Encryption

slide-18
SLIDE 18

Security says: under an unknown random key K ๏ Nothing about messages leaks ๏ Cannot forge new valid ciphertexts

  • 1. K ↞ Gen(1λ)
  • 2. C ← Enc(K,N,A,M,!) |C|=|M| + !
  • 3. M/⟘ ← Dec(K,N,A,C,!)

Authenticated Encryption

slide-19
SLIDE 19

Simplifying

  • 1. K ↞ Gen(1λ)
  • 2. C ← Enc(K,M) |C|=|M| + !
  • 3. M/⟘ ← Dec(K,C)
slide-20
SLIDE 20

Simplifying

  • 1. K ↞ Gen(1λ)
  • 2. C ← Enc(K,M) |C|=|M| + !
  • 3. M/⟘ ← Dec(K,C)

A Keyed Injection

slide-21
SLIDE 21

Ideal Encryption

slide-22
SLIDE 22

Ideal Encryption

Hash

slide-23
SLIDE 23

Ideal Encryption

Function Hash

slide-24
SLIDE 24

Ideal Encryption

Ideal Hash Function Hash

slide-25
SLIDE 25

Ideal Encryption

Random Ideal Hash Function Hash

slide-26
SLIDE 26

Ideal Encryption

Cipher Random Ideal Hash Function Hash

slide-27
SLIDE 27

Ideal Encryption

Keyed Permutation Cipher Random Ideal Hash Function Hash

slide-28
SLIDE 28

Ideal Encryption

Ideal Cipher Keyed Permutation Cipher Random Ideal Hash Function Hash

slide-29
SLIDE 29

Ideal Encryption

Random Ideal Cipher Keyed Permutation Cipher Random Ideal Hash Function Hash

slide-30
SLIDE 30

Ideal Encryption

Encryption Random Ideal Cipher Keyed Permutation Cipher Random Ideal Hash Function Hash

slide-31
SLIDE 31

Ideal Encryption

Keyed Injection Encryption Random Ideal Cipher Keyed Permutation Cipher Random Ideal Hash Function Hash

slide-32
SLIDE 32

Ideal Encryption

Keyed Injection Encryption Random Ideal Cipher Keyed Permutation Cipher Ideal Encryption Random Ideal Hash Function Hash

slide-33
SLIDE 33

Random

Ideal Encryption

Keyed Injection Encryption Random Ideal Cipher Keyed Permutation Cipher Ideal Encryption Random Ideal Hash Function Hash

slide-34
SLIDE 34

Random

Ideal Encryption

Keyed Injection Encryption Random Ideal Cipher Keyed Permutation Cipher Ideal Encryption Random Ideal Hash Function Hash New 
 Ideal Model

slide-35
SLIDE 35

Encryption

Random Function Encryption Inherit
 all strengths Ideal Ideal Hash What Object?

slide-36
SLIDE 36

Encryption

Random Function Random Keyed Injection Encryption Inherit
 all strengths Ideal Ideal Hash

slide-37
SLIDE 37

Encryption

Random Function Random Keyed Injection Encryption Inherit
 all strengths Ideal Ideal Hash

slide-38
SLIDE 38

Encryption

Random Function Indifferentiability Random Keyed Injection Encryption Inherit
 all strengths Ideal Ideal Hash

slide-39
SLIDE 39

Indifferentiability

CRO is “as good as” iEnc:

slide-40
SLIDE 40

Indifferentiability

≈ iEnc CRO CRO is “as good as” iEnc:

slide-41
SLIDE 41

Indifferentiability

≈ iEnc , RO CRO CRO is “as good as” iEnc:

slide-42
SLIDE 42

Indifferentiability

≈ iEnc , RO CRO , RO CRO is “as good as” iEnc:

slide-43
SLIDE 43

Indifferentiability

≈ , SiEnc iEnc , RO CRO CRO is “as good as” iEnc:

slide-44
SLIDE 44

Indifferentiability

C RO iEnc S D

≈ , SiEnc iEnc , RO CRO CRO is “as good as” iEnc:

slide-45
SLIDE 45

Indifferentiability

C RO iEnc S D

≈ , SiEnc iEnc , RO CRO Unified Attack Surface CRO is “as good as” iEnc:

slide-46
SLIDE 46

Indifferentiability

C RO iEnc S D

≈ , SiEnc iEnc , RO CRO Unified Attack Surface Keys can be under adversarial control CRO is “as good as” iEnc:

slide-47
SLIDE 47

Why Indifferentiability?

Theorem [MRH04]: If CRO is indifferentiable from iEnc, then it is secure in many adversarial environments in the RO model.

slide-48
SLIDE 48

Why Indifferentiability?

Theorem [MRH04]: If CRO is indifferentiable from iEnc, then it is secure in many adversarial environments in the RO model.

AE, MRAE, & RAE

slide-49
SLIDE 49

Why Indifferentiability?

Theorem [MRH04]: If CRO is indifferentiable from iEnc, then it is secure in many adversarial environments in the RO model.

RKA Security KDM Security Deduplication Committing Encryption Leakage Resilience AE, MRAE, & RAE

slide-50
SLIDE 50

Why Indifferentiability?

Theorem [MRH04]: If CRO is indifferentiable from iEnc, then it is secure in many adversarial environments in the RO model.

RKA Security KDM Security Deduplication Committing Encryption Leakage Resilience AE, MRAE, & RAE Unforeseen Models Combined Models

slide-51
SLIDE 51

Why Indifferentiability?

Theorem [MRH04]: If CRO is indifferentiable from iEnc, then it is secure in many adversarial environments in the RO model.

RKA Security KDM Security Deduplication Committing Encryption Leakage Resilience AE, MRAE, & RAE Unforeseen Models Combined Models Single stage

slide-52
SLIDE 52

So…

Are there any indifferentiable encryption schemes out there?

slide-53
SLIDE 53

Generic Composition [NRS14]

T N A M T N C

EK

T FL N A M T N FL IV IV IV IV T N IV T N IV N IV T N IV T

scheme

A1

scheme

A2

scheme

A3

scheme

A4

scheme

A7

scheme

A6

scheme

A5

scheme

A8

FL

EK EK EK EK EK EK EK

FL FL FL FL FL FL FL FL FL FL FL FL M M M M M C C C M A A A C C A A A C C

slide-54
SLIDE 54

Generic Composition [NRS14]

T N A M T N C

EK

T FL N A M T N FL IV IV IV IV T N IV T N IV N IV T N IV T

scheme

A1

scheme

A2

scheme

A3

scheme

A4

scheme

A7

scheme

A6

scheme

A5

scheme

A8

FL

EK EK EK EK EK EK EK

FL FL FL FL FL FL FL FL FL FL FL FL M M M M M C C C M A A A C C A A A C C

Enc-then-Mac

slide-55
SLIDE 55

Generic Composition [NRS14]

T N A M T N C

EK

T FL N A M T N FL IV IV IV IV T N IV T N IV N IV T N IV T

scheme

A1

scheme

A2

scheme

A3

scheme

A4

scheme

A7

scheme

A6

scheme

A5

scheme

A8

FL

EK EK EK EK EK EK EK

FL FL FL FL FL FL FL FL FL FL FL FL M M M M M C C C M A A A C C A A A C C

Enc-then-Mac Mac-then-Enc

slide-56
SLIDE 56

Generic Composition [NRS14]

T N A M T N C

EK

T FL N A M T N FL IV IV IV IV T N IV T N IV N IV T N IV T

scheme

A1

scheme

A2

scheme

A3

scheme

A4

scheme

A7

scheme

A6

scheme

A5

scheme

A8

FL

EK EK EK EK EK EK EK

FL FL FL FL FL FL FL FL FL FL FL FL M M M M M C C C M A A A C C A A A C C

Enc-then-Mac Mac-then-Enc SIV

slide-57
SLIDE 57

Attack on Enc-then-Mac

T N A M IV

scheme

A5

FL

EK

FL C

slide-58
SLIDE 58

Attack on Enc-then-Mac

T N A M IV

scheme

A5

FL

EK

FL C

Construction: Changing K does not affect T iEnc: Random Injection: changing K will change T

slide-59
SLIDE 59

Attack on Enc-then-Mac

T N A M IV

scheme

A5

FL

EK

FL C

Construction: Changing K does not affect T iEnc: Random Injection: changing K will change T Interpretation: Related-Key Attacks

slide-60
SLIDE 60

General Attacks

  • Algo. AE(K, N, A, M, τ)

(est0, est1) ← Ie(K, N, A, M, τ) (K0, N 0, M 0, τ 0) ← E H

0 (est0)

C0 ← E(K0, N 0, ε, M 0, τ 0) C ← E H

1 (C0, est1)

return C

  • Algo. AD(K, N, A, C, τ)

(dst0, dst1) ← Id(K, N, A, C, τ) (K0, N 0, C0, τ 0) ← DH

0 (dst0)

M 0 ← D(K0, N 0, ε, C0, τ 0) M ← DH

1 (M 0, dst1)

return M

A template for generic composition. Two types of attacks based on how information flows.

slide-61
SLIDE 61

Attacks: Specifics Schemes

M C M1 M1 C1 C1 X1 S M M C C
  • 1, 1
Mm Mm Cm Cm Xm Y1 S S ’ ’ ’ ’ Zl-1 Z1 Zl Z1 L R L R X S
  • 1, 5
0, 5 0, 5 0, 0 0, 0 2, 1 2, m 0, 0 0, 0 0, 1 1, 1 1, m 1, m 1, 1 0, 2 i+2, 1 i+2, l −1 Y ∆i
  • 1, 2
∆ ∆ ∆ ⊕ 1 0, 6 0, 6 0, 6 0, 6 0, 6 0, 6 0, 6 0, 6 ∆ ⊕ 0 ∆ ⊕ 3 ∆ ⊕ 2 ∆ ⊕ 6 ∆ ⊕ 5 ∆ ⊕ 7 X Y Ym * * ∆ ⊕ 4

...

10*

... ...

C
  • 1, 4
0, 4 0, 4 S X Y M ∆i Zl Zl -1 i+2, 1 i+2, l −1 i+2, l i+2, 0

AEZ [HKR17] OCB [Rog et al.] Deoxys [JNP15]

slide-62
SLIDE 62

Indifferntius

slide-63
SLIDE 63

So…

Any indifferentiable encryption schemes?

slide-64
SLIDE 64

Feistel

slide-65
SLIDE 65

Feistel

R L

RO1 RO2 RO3

slide-66
SLIDE 66

Feistel

R L

RO1 RO2 RO3

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Permutation

slide-67
SLIDE 67

Feistel

R L

RO1 RO2 RO3

1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Permutation

slide-68
SLIDE 68

Feistel

R L

RO1 RO2 RO3

1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Permutation

slide-69
SLIDE 69

Feistel

R L

RO1 RO2 RO3

1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Permutation

slide-70
SLIDE 70

Feistel

RO1 RO2 RO3

M

1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Permutation

slide-71
SLIDE 71

Feistel

Theorem: 3 rounds of Feistel are necessary and sufficient to build a random injection.

RO1 RO2 RO3

M

1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Permutation

slide-72
SLIDE 72

Feistel

Theorem: 3 rounds of Feistel are necessary and sufficient to build a random injection.

RO1 RO2 RO3

M

1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Permutation Injection

slide-73
SLIDE 73

Online Encryption

Some applications need to process messages “on the fly”:

M1 C1 M2

<latexit sha1_base64="RAMNCfFfl+teUb1wrOtEv0U5atI=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mKUI8FL16EivYD2lA20m7dLMJuxuhP4ELx4U8eov8ua/cdvmoK0PBh7vzTAzL0gE18Z1v53CxubW9k5xt7S3f3B4VD4+aes4VQxbLBax6gZUo+ASW4Ybgd1EIY0CgZ1gcjP3O0+oNI/lo5km6Ed0JHnIGTVWergb1Ablilt1FyDrxMtJBXI0B+Wv/jBmaYTSMEG17nluYvyMKsOZwFmpn2pMKJvQEfYslTRC7WeLU2fkwipDEsbKljRkof6eyGik9TQKbGdEzVivenPxP6+XmvDaz7hMUoOSLReFqSAmJvO/yZArZEZMLaFMcXsrYWOqKDM2nZINwVt9eZ20a1XPrXr3V5VGLY+jCGdwDpfgQR0acAtNaAGDETzDK7w5wnlx3p2PZWvByWdO4Q+czx/G041m</latexit><latexit sha1_base64="RAMNCfFfl+teUb1wrOtEv0U5atI=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mKUI8FL16EivYD2lA20m7dLMJuxuhP4ELx4U8eov8ua/cdvmoK0PBh7vzTAzL0gE18Z1v53CxubW9k5xt7S3f3B4VD4+aes4VQxbLBax6gZUo+ASW4Ybgd1EIY0CgZ1gcjP3O0+oNI/lo5km6Ed0JHnIGTVWergb1Ablilt1FyDrxMtJBXI0B+Wv/jBmaYTSMEG17nluYvyMKsOZwFmpn2pMKJvQEfYslTRC7WeLU2fkwipDEsbKljRkof6eyGik9TQKbGdEzVivenPxP6+XmvDaz7hMUoOSLReFqSAmJvO/yZArZEZMLaFMcXsrYWOqKDM2nZINwVt9eZ20a1XPrXr3V5VGLY+jCGdwDpfgQR0acAtNaAGDETzDK7w5wnlx3p2PZWvByWdO4Q+czx/G041m</latexit><latexit sha1_base64="RAMNCfFfl+teUb1wrOtEv0U5atI=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mKUI8FL16EivYD2lA20m7dLMJuxuhP4ELx4U8eov8ua/cdvmoK0PBh7vzTAzL0gE18Z1v53CxubW9k5xt7S3f3B4VD4+aes4VQxbLBax6gZUo+ASW4Ybgd1EIY0CgZ1gcjP3O0+oNI/lo5km6Ed0JHnIGTVWergb1Ablilt1FyDrxMtJBXI0B+Wv/jBmaYTSMEG17nluYvyMKsOZwFmpn2pMKJvQEfYslTRC7WeLU2fkwipDEsbKljRkof6eyGik9TQKbGdEzVivenPxP6+XmvDaz7hMUoOSLReFqSAmJvO/yZArZEZMLaFMcXsrYWOqKDM2nZINwVt9eZ20a1XPrXr3V5VGLY+jCGdwDpfgQR0acAtNaAGDETzDK7w5wnlx3p2PZWvByWdO4Q+czx/G041m</latexit><latexit sha1_base64="RAMNCfFfl+teUb1wrOtEv0U5atI=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mKUI8FL16EivYD2lA20m7dLMJuxuhP4ELx4U8eov8ua/cdvmoK0PBh7vzTAzL0gE18Z1v53CxubW9k5xt7S3f3B4VD4+aes4VQxbLBax6gZUo+ASW4Ybgd1EIY0CgZ1gcjP3O0+oNI/lo5km6Ed0JHnIGTVWergb1Ablilt1FyDrxMtJBXI0B+Wv/jBmaYTSMEG17nluYvyMKsOZwFmpn2pMKJvQEfYslTRC7WeLU2fkwipDEsbKljRkof6eyGik9TQKbGdEzVivenPxP6+XmvDaz7hMUoOSLReFqSAmJvO/yZArZEZMLaFMcXsrYWOqKDM2nZINwVt9eZ20a1XPrXr3V5VGLY+jCGdwDpfgQR0acAtNaAGDETzDK7w5wnlx3p2PZWvByWdO4Q+czx/G041m</latexit>

M3

<latexit sha1_base64="zEnN/tG7nILVR7uHhYLlklxv8A=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mqoMeCFy9CRfsBbSib7aRdutmE3Y1Qn+CFw+KePUXefPfuG1z0NYHA4/3ZpiZFySCa+O6305hbX1jc6u4XdrZ3ds/KB8etXScKoZNFotYdQKqUXCJTcONwE6ikEaBwHYwvpn57SdUmsfy0UwS9CM6lDzkjBorPdz1L/rlilt15yCrxMtJBXI0+uWv3iBmaYTSMEG17npuYvyMKsOZwGmpl2pMKBvTIXYtlTRC7WfzU6fkzCoDEsbKljRkrv6eyGik9SQKbGdEzUgvezPxP6+bmvDaz7hMUoOSLRaFqSAmJrO/yYArZEZMLKFMcXsrYSOqKDM2nZINwVt+eZW0alXPrXr3l5V6LY+jCdwCufgwRXU4RYa0AQGQ3iGV3hzhPivDsfi9aCk8cwx84nz/IV41n</latexit><latexit sha1_base64="zEnN/tG7nILVR7uHhYLlklxv8A=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mqoMeCFy9CRfsBbSib7aRdutmE3Y1Qn+CFw+KePUXefPfuG1z0NYHA4/3ZpiZFySCa+O6305hbX1jc6u4XdrZ3ds/KB8etXScKoZNFotYdQKqUXCJTcONwE6ikEaBwHYwvpn57SdUmsfy0UwS9CM6lDzkjBorPdz1L/rlilt15yCrxMtJBXI0+uWv3iBmaYTSMEG17npuYvyMKsOZwGmpl2pMKBvTIXYtlTRC7WfzU6fkzCoDEsbKljRkrv6eyGik9SQKbGdEzUgvezPxP6+bmvDaz7hMUoOSLRaFqSAmJrO/yYArZEZMLKFMcXsrYSOqKDM2nZINwVt+eZW0alXPrXr3l5V6LY+jCdwCufgwRXU4RYa0AQGQ3iGV3hzhPivDsfi9aCk8cwx84nz/IV41n</latexit><latexit sha1_base64="zEnN/tG7nILVR7uHhYLlklxv8A=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mqoMeCFy9CRfsBbSib7aRdutmE3Y1Qn+CFw+KePUXefPfuG1z0NYHA4/3ZpiZFySCa+O6305hbX1jc6u4XdrZ3ds/KB8etXScKoZNFotYdQKqUXCJTcONwE6ikEaBwHYwvpn57SdUmsfy0UwS9CM6lDzkjBorPdz1L/rlilt15yCrxMtJBXI0+uWv3iBmaYTSMEG17npuYvyMKsOZwGmpl2pMKBvTIXYtlTRC7WfzU6fkzCoDEsbKljRkrv6eyGik9SQKbGdEzUgvezPxP6+bmvDaz7hMUoOSLRaFqSAmJrO/yYArZEZMLKFMcXsrYSOqKDM2nZINwVt+eZW0alXPrXr3l5V6LY+jCdwCufgwRXU4RYa0AQGQ3iGV3hzhPivDsfi9aCk8cwx84nz/IV41n</latexit><latexit sha1_base64="zEnN/tG7nILVR7uHhYLlklxv8A=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mqoMeCFy9CRfsBbSib7aRdutmE3Y1Qn+CFw+KePUXefPfuG1z0NYHA4/3ZpiZFySCa+O6305hbX1jc6u4XdrZ3ds/KB8etXScKoZNFotYdQKqUXCJTcONwE6ikEaBwHYwvpn57SdUmsfy0UwS9CM6lDzkjBorPdz1L/rlilt15yCrxMtJBXI0+uWv3iBmaYTSMEG17npuYvyMKsOZwGmpl2pMKBvTIXYtlTRC7WfzU6fkzCoDEsbKljRkrv6eyGik9SQKbGdEzUgvezPxP6+bmvDaz7hMUoOSLRaFqSAmJrO/yYArZEZMLKFMcXsrYSOqKDM2nZINwVt+eZW0alXPrXr3l5V6LY+jCdwCufgwRXU4RYa0AQGQ3iGV3hzhPivDsfi9aCk8cwx84nz/IV41n</latexit>

M`

<latexit sha1_base64="BVF/XQ6NTl+95DiYaS6E5wGZc=">AB7XicbVDLSgNBEOz1GeMr6tHLYBA8hd0g6DHgxYsQwTwgWcLspDcZMzuzMwKIeQfvHhQxKv/482/cZLsQRMLGoqbrq7olRwY3/21tb39jc2i7sFHf39g8OS0fHTaMyzbDBlFC6HVGDgktsWG4FtlONIkEtqLRzcxvPaE2XMkHO04xTOhA8pgzap3UvOt1UYheqexX/DnIKglyUoYc9V7pq9tXLEtQWiaoMZ3AT204odpyJnBa7GYGU8pGdIAdRyVN0IST+bVTcu6UPomVdiUtmau/JyY0MWacRK4zoXZolr2Z+J/XyWx8HU64TDOLki0WxZkgVpHZ6TPNTIrxo5Qprm7lbAh1ZRZF1DRhRAsv7xKmtVK4FeC+8tyrZrHUYBTOIMLCOAKanALdWgAg0d4hld485T34r17H4vWNS+fOYE/8D5/AFojus=</latexit><latexit sha1_base64="BVF/XQ6NTl+95DiYaS6E5wGZc=">AB7XicbVDLSgNBEOz1GeMr6tHLYBA8hd0g6DHgxYsQwTwgWcLspDcZMzuzMwKIeQfvHhQxKv/482/cZLsQRMLGoqbrq7olRwY3/21tb39jc2i7sFHf39g8OS0fHTaMyzbDBlFC6HVGDgktsWG4FtlONIkEtqLRzcxvPaE2XMkHO04xTOhA8pgzap3UvOt1UYheqexX/DnIKglyUoYc9V7pq9tXLEtQWiaoMZ3AT204odpyJnBa7GYGU8pGdIAdRyVN0IST+bVTcu6UPomVdiUtmau/JyY0MWacRK4zoXZolr2Z+J/XyWx8HU64TDOLki0WxZkgVpHZ6TPNTIrxo5Qprm7lbAh1ZRZF1DRhRAsv7xKmtVK4FeC+8tyrZrHUYBTOIMLCOAKanALdWgAg0d4hld485T34r17H4vWNS+fOYE/8D5/AFojus=</latexit><latexit sha1_base64="BVF/XQ6NTl+95DiYaS6E5wGZc=">AB7XicbVDLSgNBEOz1GeMr6tHLYBA8hd0g6DHgxYsQwTwgWcLspDcZMzuzMwKIeQfvHhQxKv/482/cZLsQRMLGoqbrq7olRwY3/21tb39jc2i7sFHf39g8OS0fHTaMyzbDBlFC6HVGDgktsWG4FtlONIkEtqLRzcxvPaE2XMkHO04xTOhA8pgzap3UvOt1UYheqexX/DnIKglyUoYc9V7pq9tXLEtQWiaoMZ3AT204odpyJnBa7GYGU8pGdIAdRyVN0IST+bVTcu6UPomVdiUtmau/JyY0MWacRK4zoXZolr2Z+J/XyWx8HU64TDOLki0WxZkgVpHZ6TPNTIrxo5Qprm7lbAh1ZRZF1DRhRAsv7xKmtVK4FeC+8tyrZrHUYBTOIMLCOAKanALdWgAg0d4hld485T34r17H4vWNS+fOYE/8D5/AFojus=</latexit><latexit sha1_base64="BVF/XQ6NTl+95DiYaS6E5wGZc=">AB7XicbVDLSgNBEOz1GeMr6tHLYBA8hd0g6DHgxYsQwTwgWcLspDcZMzuzMwKIeQfvHhQxKv/482/cZLsQRMLGoqbrq7olRwY3/21tb39jc2i7sFHf39g8OS0fHTaMyzbDBlFC6HVGDgktsWG4FtlONIkEtqLRzcxvPaE2XMkHO04xTOhA8pgzap3UvOt1UYheqexX/DnIKglyUoYc9V7pq9tXLEtQWiaoMZ3AT204odpyJnBa7GYGU8pGdIAdRyVN0IST+bVTcu6UPomVdiUtmau/JyY0MWacRK4zoXZolr2Z+J/XyWx8HU64TDOLki0WxZkgVpHZ6TPNTIrxo5Qprm7lbAh1ZRZF1DRhRAsv7xKmtVK4FeC+8tyrZrHUYBTOIMLCOAKanALdWgAg0d4hld485T34r17H4vWNS+fOYE/8D5/AFojus=</latexit>

C`

<latexit sha1_base64="WZPt46m0yfYb1ywqF0uZVOhIz4=">AB7XicbVA9SwNBEJ2LXzF+RS1tFoNgFe6CoGUgjWUEkwjJEfY2c8mavd1jd08If/BxkIRW/+Pnf/GTXKFJj4YeLw3w8y8KBXcWN/9gobm1vbO8Xd0t7+weFR+fikbVSmGbaYEko/RNSg4BJbluBD6lGmkQCO9G4Mfc7T6gNV/LeTlIMEzqUPOaMWie1G/0eCtEvV/yqvwBZJ0FOKpCj2S9/9QaKZQlKywQ1phv4qQ2nVFvOBM5KvcxgStmYDrHrqKQJmnC6uHZGLpwyILHSrqQlC/X3xJQmxkySyHUm1I7MqjcX/O6mY1vwimXaWZRsuWiOBPEKjJ/nQy4RmbFxBHKNHe3EjaimjLrAiq5EILVl9dJu1YN/Gpwd1Wp1/I4inAG53AJAVxDHW6hCS1g8AjP8ApvnvJevHfvY9la8PKZU/gD7/MHSs6O4Q=</latexit><latexit sha1_base64="WZPt46m0yfYb1ywqF0uZVOhIz4=">AB7XicbVA9SwNBEJ2LXzF+RS1tFoNgFe6CoGUgjWUEkwjJEfY2c8mavd1jd08If/BxkIRW/+Pnf/GTXKFJj4YeLw3w8y8KBXcWN/9gobm1vbO8Xd0t7+weFR+fikbVSmGbaYEko/RNSg4BJbluBD6lGmkQCO9G4Mfc7T6gNV/LeTlIMEzqUPOaMWie1G/0eCtEvV/yqvwBZJ0FOKpCj2S9/9QaKZQlKywQ1phv4qQ2nVFvOBM5KvcxgStmYDrHrqKQJmnC6uHZGLpwyILHSrqQlC/X3xJQmxkySyHUm1I7MqjcX/O6mY1vwimXaWZRsuWiOBPEKjJ/nQy4RmbFxBHKNHe3EjaimjLrAiq5EILVl9dJu1YN/Gpwd1Wp1/I4inAG53AJAVxDHW6hCS1g8AjP8ApvnvJevHfvY9la8PKZU/gD7/MHSs6O4Q=</latexit><latexit sha1_base64="WZPt46m0yfYb1ywqF0uZVOhIz4=">AB7XicbVA9SwNBEJ2LXzF+RS1tFoNgFe6CoGUgjWUEkwjJEfY2c8mavd1jd08If/BxkIRW/+Pnf/GTXKFJj4YeLw3w8y8KBXcWN/9gobm1vbO8Xd0t7+weFR+fikbVSmGbaYEko/RNSg4BJbluBD6lGmkQCO9G4Mfc7T6gNV/LeTlIMEzqUPOaMWie1G/0eCtEvV/yqvwBZJ0FOKpCj2S9/9QaKZQlKywQ1phv4qQ2nVFvOBM5KvcxgStmYDrHrqKQJmnC6uHZGLpwyILHSrqQlC/X3xJQmxkySyHUm1I7MqjcX/O6mY1vwimXaWZRsuWiOBPEKjJ/nQy4RmbFxBHKNHe3EjaimjLrAiq5EILVl9dJu1YN/Gpwd1Wp1/I4inAG53AJAVxDHW6hCS1g8AjP8ApvnvJevHfvY9la8PKZU/gD7/MHSs6O4Q=</latexit><latexit sha1_base64="WZPt46m0yfYb1ywqF0uZVOhIz4=">AB7XicbVA9SwNBEJ2LXzF+RS1tFoNgFe6CoGUgjWUEkwjJEfY2c8mavd1jd08If/BxkIRW/+Pnf/GTXKFJj4YeLw3w8y8KBXcWN/9gobm1vbO8Xd0t7+weFR+fikbVSmGbaYEko/RNSg4BJbluBD6lGmkQCO9G4Mfc7T6gNV/LeTlIMEzqUPOaMWie1G/0eCtEvV/yqvwBZJ0FOKpCj2S9/9QaKZQlKywQ1phv4qQ2nVFvOBM5KvcxgStmYDrHrqKQJmnC6uHZGLpwyILHSrqQlC/X3xJQmxkySyHUm1I7MqjcX/O6mY1vwimXaWZRsuWiOBPEKjJ/nQy4RmbFxBHKNHe3EjaimjLrAiq5EILVl9dJu1YN/Gpwd1Wp1/I4inAG53AJAVxDHW6hCS1g8AjP8ApvnvJevHfvY9la8PKZU/gD7/MHSs6O4Q=</latexit>

C2

<latexit sha1_base64="CNu83T5AWVBVW7fv3cxAz6AIyw0=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mKUI+FXjxWtB/QhrLZbtqlm03YnQgl9Cd48aCIV3+RN/+N2zYHbX0w8Hhvhpl5QSKFQdf9dgpb2zu7e8X90sHh0fFJ+fSsY+JUM95msYx1L6CGS6F4GwVK3ks0p1EgeTeYNhd+94lrI2L1iLOE+xEdKxEKRtFKD81hbViuFV3CbJvJxUIEdrWP4ajGKWRlwhk9SYvucm6GdUo2CSz0uD1PCEsikd876likbc+Nny1Dm5sqIhLG2pZAs1d8TGY2MmUWB7YwoTsy6txD/8/ophrd+JlSIldstShMJcGYLP4mI6E5QzmzhDIt7K2ETaimDG06JRuCt/7yJunUqp5b9e5vKo1aHkcRLuASrsGDOjTgDlrQBgZjeIZXeHOk8+K8Ox+r1oKTz5zDHzifP7eXjVw=</latexit><latexit sha1_base64="CNu83T5AWVBVW7fv3cxAz6AIyw0=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mKUI+FXjxWtB/QhrLZbtqlm03YnQgl9Cd48aCIV3+RN/+N2zYHbX0w8Hhvhpl5QSKFQdf9dgpb2zu7e8X90sHh0fFJ+fSsY+JUM95msYx1L6CGS6F4GwVK3ks0p1EgeTeYNhd+94lrI2L1iLOE+xEdKxEKRtFKD81hbViuFV3CbJvJxUIEdrWP4ajGKWRlwhk9SYvucm6GdUo2CSz0uD1PCEsikd876likbc+Nny1Dm5sqIhLG2pZAs1d8TGY2MmUWB7YwoTsy6txD/8/ophrd+JlSIldstShMJcGYLP4mI6E5QzmzhDIt7K2ETaimDG06JRuCt/7yJunUqp5b9e5vKo1aHkcRLuASrsGDOjTgDlrQBgZjeIZXeHOk8+K8Ox+r1oKTz5zDHzifP7eXjVw=</latexit><latexit sha1_base64="CNu83T5AWVBVW7fv3cxAz6AIyw0=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mKUI+FXjxWtB/QhrLZbtqlm03YnQgl9Cd48aCIV3+RN/+N2zYHbX0w8Hhvhpl5QSKFQdf9dgpb2zu7e8X90sHh0fFJ+fSsY+JUM95msYx1L6CGS6F4GwVK3ks0p1EgeTeYNhd+94lrI2L1iLOE+xEdKxEKRtFKD81hbViuFV3CbJvJxUIEdrWP4ajGKWRlwhk9SYvucm6GdUo2CSz0uD1PCEsikd876likbc+Nny1Dm5sqIhLG2pZAs1d8TGY2MmUWB7YwoTsy6txD/8/ophrd+JlSIldstShMJcGYLP4mI6E5QzmzhDIt7K2ETaimDG06JRuCt/7yJunUqp5b9e5vKo1aHkcRLuASrsGDOjTgDlrQBgZjeIZXeHOk8+K8Ox+r1oKTz5zDHzifP7eXjVw=</latexit><latexit sha1_base64="CNu83T5AWVBVW7fv3cxAz6AIyw0=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mKUI+FXjxWtB/QhrLZbtqlm03YnQgl9Cd48aCIV3+RN/+N2zYHbX0w8Hhvhpl5QSKFQdf9dgpb2zu7e8X90sHh0fFJ+fSsY+JUM95msYx1L6CGS6F4GwVK3ks0p1EgeTeYNhd+94lrI2L1iLOE+xEdKxEKRtFKD81hbViuFV3CbJvJxUIEdrWP4ajGKWRlwhk9SYvucm6GdUo2CSz0uD1PCEsikd876likbc+Nny1Dm5sqIhLG2pZAs1d8TGY2MmUWB7YwoTsy6txD/8/ophrd+JlSIldstShMJcGYLP4mI6E5QzmzhDIt7K2ETaimDG06JRuCt/7yJunUqp5b9e5vKo1aHkcRLuASrsGDOjTgDlrQBgZjeIZXeHOk8+K8Ox+r1oKTz5zDHzifP7eXjVw=</latexit>

C3

<latexit sha1_base64="qh2sDQUtahM1wq0EF/qOSF4XWVU=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mqoMdCLx4r2g9oQ9lsJ+3SzSbsboQS+hO8eFDEq7/Im/GbZuDtj4YeLw3w8y8IBFcG9f9dgobm1vbO8Xd0t7+weFR+fikreNUMWyxWMSqG1CNgktsGW4EdhOFNAoEdoJY+53nlBpHstHM03Qj+hI8pAzaqz0BhcDcoVt+ouQNaJl5MK5GgOyl/9YczSCKVhgmrd89zE+BlVhjOBs1I/1ZhQNqEj7FkqaYTazxanzsiFVYkjJUtachC/T2R0UjraRTYzoiasV715uJ/Xi814a2fcZmkBiVbLgpTQUxM5n+TIVfIjJhaQpni9lbCxlRZmw6JRuCt/ryOmnXqp5b9e6vK/VaHkcRzuAcLsGDG6jDHTShBQxG8Ayv8OYI58V5dz6WrQUnzmFP3A+fwC5G41d</latexit><latexit sha1_base64="qh2sDQUtahM1wq0EF/qOSF4XWVU=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mqoMdCLx4r2g9oQ9lsJ+3SzSbsboQS+hO8eFDEq7/Im/GbZuDtj4YeLw3w8y8IBFcG9f9dgobm1vbO8Xd0t7+weFR+fikreNUMWyxWMSqG1CNgktsGW4EdhOFNAoEdoJY+53nlBpHstHM03Qj+hI8pAzaqz0BhcDcoVt+ouQNaJl5MK5GgOyl/9YczSCKVhgmrd89zE+BlVhjOBs1I/1ZhQNqEj7FkqaYTazxanzsiFVYkjJUtachC/T2R0UjraRTYzoiasV715uJ/Xi814a2fcZmkBiVbLgpTQUxM5n+TIVfIjJhaQpni9lbCxlRZmw6JRuCt/ryOmnXqp5b9e6vK/VaHkcRzuAcLsGDG6jDHTShBQxG8Ayv8OYI58V5dz6WrQUnzmFP3A+fwC5G41d</latexit><latexit sha1_base64="qh2sDQUtahM1wq0EF/qOSF4XWVU=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mqoMdCLx4r2g9oQ9lsJ+3SzSbsboQS+hO8eFDEq7/Im/GbZuDtj4YeLw3w8y8IBFcG9f9dgobm1vbO8Xd0t7+weFR+fikreNUMWyxWMSqG1CNgktsGW4EdhOFNAoEdoJY+53nlBpHstHM03Qj+hI8pAzaqz0BhcDcoVt+ouQNaJl5MK5GgOyl/9YczSCKVhgmrd89zE+BlVhjOBs1I/1ZhQNqEj7FkqaYTazxanzsiFVYkjJUtachC/T2R0UjraRTYzoiasV715uJ/Xi814a2fcZmkBiVbLgpTQUxM5n+TIVfIjJhaQpni9lbCxlRZmw6JRuCt/ryOmnXqp5b9e6vK/VaHkcRzuAcLsGDG6jDHTShBQxG8Ayv8OYI58V5dz6WrQUnzmFP3A+fwC5G41d</latexit><latexit sha1_base64="qh2sDQUtahM1wq0EF/qOSF4XWVU=">AB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0mqoMdCLx4r2g9oQ9lsJ+3SzSbsboQS+hO8eFDEq7/Im/GbZuDtj4YeLw3w8y8IBFcG9f9dgobm1vbO8Xd0t7+weFR+fikreNUMWyxWMSqG1CNgktsGW4EdhOFNAoEdoJY+53nlBpHstHM03Qj+hI8pAzaqz0BhcDcoVt+ouQNaJl5MK5GgOyl/9YczSCKVhgmrd89zE+BlVhjOBs1I/1ZhQNqEj7FkqaYTazxanzsiFVYkjJUtachC/T2R0UjraRTYzoiasV715uJ/Xi814a2fcZmkBiVbLgpTQUxM5n+TIVfIjJhaQpni9lbCxlRZmw6JRuCt/ryOmnXqp5b9e6vK/VaHkcRzuAcLsGDG6jDHTShBQxG8Ayv8OYI58V5dz6WrQUnzmFP3A+fwC5G41d</latexit>

EK

<latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit>

EK

<latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit>

EK

<latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit>

EK

<latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit><latexit sha1_base64="A7opEKJVGquMhciN+wtN+3q5Js=">AB9HicbVDLSgMxFL3js9ZX1aWbYBFclZki6LIguCmgn1AO5RMetuGZjJjkimUod/hxoUibv0Yd/6NmXYW2nogcDjnXu7JCWLBtXHdb2dtfWNza7uwU9zd2z84LB0dN3WUKIYNFolItQOqUXCJDcONwHaskIaBwFYwvsn81gSV5pF8NMY/ZAOJR9wRo2V/G5IzYhRkd7Oeve9UtmtuHOQVeLlpAw56r3SV7cfsSREaZigWnc8NzZ+SpXhTOCs2E0xpSN6RA7lkoaovbTegZObdKnwiZ80ZK7+3khpqPU0DOxkFlIve5n4n9dJzODaT7mME4OSLQ4NEkFMRLIGSJ8rZEZMLaFMcZuVsBFVlBnbU9GW4C1/eZU0qxXPrXgPl+VaNa+jAKdwBhfgwRXU4A7q0AGT/AMr/DmTJwX5935WIyuOfnOCfyB8/kDxoCSCQ=</latexit>

Leads to: A definition of online random keyed injections.

slide-74
SLIDE 74

Turning It On

Theorem: Chaining an AEAD up indifferentiability turns it on.

slide-75
SLIDE 75

Turning It On

K N E M1 M3 C3 C1 A1 A3 S H0 H1 `1 `3 `1 + ⌧1 `3 + ⌧3 E S S H1

K1

M2 C2 A2 `2 `2 + ⌧2 H2 H2 H3

K1 K1 K2 K2

E τ1 τ2 τ3

Theorem: Chaining an AEAD up indifferentiability turns it on.

slide-76
SLIDE 76

Efficiency Lower Bound

Theorem: Any indifferentiable construction of a wn-bit random injection from an n-bit permutation must place at least 2w-2 queries.

slide-77
SLIDE 77

Efficiency Lower Bound

Theorem: Any indifferentiable construction of a wn-bit random injection from an n-bit permutation must place at least 2w-2 queries. Lower/upper bounds remain open for:

ρ := # blocks # queries ∈ [2,3) .

slide-78
SLIDE 78

Summary

RO1 RO2 RO3

M

C RO iEnc S D

New view of AE as a random keyed injection;
 Implies security in many adversarial environments.

slide-79
SLIDE 79

Summary

RO1 RO2 RO3

M

C RO iEnc S D

Thank you. New view of AE as a random keyed injection;
 Implies security in many adversarial environments.