Lightweight Cryptography and Classification of AEAD Modes Nilanjan - - PowerPoint PPT Presentation

lightweight cryptography and classification of aead modes
SMART_READER_LITE
LIVE PREVIEW

Lightweight Cryptography and Classification of AEAD Modes Nilanjan - - PowerPoint PPT Presentation

Lightweight Cryptography and Classification of AEAD Modes Nilanjan Datta Institute for Advancing Intelligence (IAI), TCG CREST International Crypto-Webniar 2020 Aug 30, 2020 N. Datta (IAI, TCG CREST) Lightweight Crypto and Classification of


slide-1
SLIDE 1

Lightweight Cryptography and Classification of AEAD Modes

Nilanjan Datta

Institute for Advancing Intelligence (IAI), TCG CREST International Crypto-Webniar 2020 Aug 30, 2020

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 1 / 70

slide-2
SLIDE 2

Content

Introduction to Authenticated Encryption Motivation of Lightweight Cryptography A Discussion on NIST LwC Project Classification of lightweight AEAD Modes

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 2 / 70

slide-3
SLIDE 3

I: An Introduction to Authenticated Encryption

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 3 / 70

slide-4
SLIDE 4

The Popular Story: Encryption

1 Alice and Bob share a secret key K

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 4 / 70

slide-5
SLIDE 5

The Popular Story: Encryption

1 Alice and Bob share a secret key K 2 Alice sends the ciphertext C = EncK(M) corresponding to a message M to Bob

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 4 / 70

slide-6
SLIDE 6

The Popular Story: Encryption

1 Alice and Bob share a secret key K 2 Alice sends the ciphertext C = EncK(M) corresponding to a message M to Bob 3 Data Privacy: Only Bob can decrypt. No information (other than length) about plaintext

is leaked from ciphertext

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 4 / 70

slide-7
SLIDE 7

The Popular Story: Encryption

EncK (“My Netflix password is nil123”)

slide-8
SLIDE 8

The Popular Story: Encryption

EncK (“My Netflix password is nil123”)

Decrypts: Read Message

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 5 / 70

slide-9
SLIDE 9

The Popular Story: Authentication

1 Alice and Bob share a secret key K

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 6 / 70

slide-10
SLIDE 10

The Popular Story: Authentication

1 Alice and Bob share a secret key K 2 Alice sends M along with tag T = TagK(M) to Bob

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 6 / 70

slide-11
SLIDE 11

The Popular Story: Authentication

1 Alice and Bob share a secret key K 2 Alice sends M along with tag T = TagK(M) to Bob 3 Data Integrity: Bob can verify valid tag and can reject all tampered tag

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 6 / 70

slide-12
SLIDE 12

The Popular Story: Authentication

“I love you”TagK (“I love you”)

slide-13
SLIDE 13

The Popular Story: Authentication

“I love you”TagK (“I love you”)

Valid Tag: Read Message

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 7 / 70

slide-14
SLIDE 14

The Popular Story: Authentication

“ I h a t e y

  • u

  • T

“I love you”TagK (“I love you”)

slide-15
SLIDE 15

The Popular Story: Authentication

“I hate you”T “I love you”TagK (“I love you”)

Invalid Tag: Ignore Message.

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 8 / 70

slide-16
SLIDE 16

Authenticated Encryption

Authentication + Encryption

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 9 / 70

slide-17
SLIDE 17

Why Authenticated Encryption?

Chasing the Gangstar Inspector Alice wishes sub-inspector Bob to move his check point to a different location

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 10 / 70

slide-18
SLIDE 18

Why Authenticated Encryption?

Chasing the Gangstar Inspector Alice wishes sub-inspector Bob to move his check point to a different location Data Privacy: The updated check point should remain confidential

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 10 / 70

slide-19
SLIDE 19

Why Authenticated Encryption?

Chasing the Gangstar Inspector Alice wishes sub-inspector Bob to move his check point to a different location Data Privacy: The updated check point should remain confidential Data Authenticity: Alice sends the updated check point and it has not been modified in transit

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 10 / 70

slide-20
SLIDE 20

Why Authenticated Encryption?

Covid Report Doctor Alice wishes to send the covid report M of Bob to the medical database

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 11 / 70

slide-21
SLIDE 21

Why Authenticated Encryption?

Covid Report Doctor Alice wishes to send the covid report M of Bob to the medical database Data Privacy: Bob’s medical records should remain confidential

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 11 / 70

slide-22
SLIDE 22

Why Authenticated Encryption?

Covid Report Doctor Alice wishes to send the covid report M of Bob to the medical database Data Privacy: Bob’s medical records should remain confidential Data Authenticity: Alice prepares the report and the report was not modified in transit

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 11 / 70

slide-23
SLIDE 23

Why Authenticated Encryption?

The Annual Evaluation

  • Prof. Alice wishes to inform the semestral marks to her students

Data Privacy: Bob’s marks should remain confidential Data Authenticity: Alice sends the marks and the marks have not been modified in transit

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 12 / 70

slide-24
SLIDE 24

Authenticated Encryption with Associated Data (AEAD)

AEAD Algorithm AE(K, AD, M, N) → (C, T)

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 13 / 70

slide-25
SLIDE 25

Authenticated Encryption with Associated Data (AEAD)

AEAD Algorithm AE(K, AD, M, N) → (C, T) What is Associated Data? Header of the Message. Example: IP Address Requires data authenticity, not privacy

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 13 / 70

slide-26
SLIDE 26

Authenticated Encryption with Associated Data (AEAD)

AEAD Algorithm AE(K, AD, M, N) → (C, T) What is Associated Data? Header of the Message. Example: IP Address Requires data authenticity, not privacy What is Nonce? An arbitrary number used only once. Example: Counter Used to generate randomness

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 13 / 70

slide-27
SLIDE 27

Authenticated Encryption with Associated Data (AEAD)

Verified Decryption Algorithm VD(K, AD, C, T, N) → M/⊥.

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 14 / 70

slide-28
SLIDE 28

Authenticated Encryption with Associated Data (AEAD)

Verified Decryption Algorithm VD(K, AD, C, T, N) → M/⊥. A Note on Verified Decryption Plaintext is only released after verification is successful Otherwise, the algorithm aborts However, the ordering of verification and decryption may vary

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 14 / 70

slide-29
SLIDE 29

II: An Introduction to Light-weight Cryptography

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 15 / 70

slide-30
SLIDE 30

Lightweight Cryptography: Use in Rain RFID Tags

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 16 / 70

slide-31
SLIDE 31

Lightweight Cryptography: Use in Vehicles

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 17 / 70

slide-32
SLIDE 32

Lightweight Cryptography: Use in Smart Home

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 18 / 70

slide-33
SLIDE 33

Lightweight Cryptography: Use in Medical Sensors

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 19 / 70

slide-34
SLIDE 34

What is Lightweight Cryptography?

Lightweight Cryptography Subfield of Cryptography that aims to provide crypto solutions tailored to constrained environments

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 20 / 70

slide-35
SLIDE 35

What is Lightweight Cryptography?

Lightweight Cryptography Subfield of Cryptography that aims to provide crypto solutions tailored to constrained environments Lightweight = Light + Weight

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 20 / 70

slide-36
SLIDE 36

What is Lightweight Cryptography?

Lightweight Cryptography Subfield of Cryptography that aims to provide crypto solutions tailored to constrained environments Lightweight = Light + Weight Weight of an Algorithm A property of its implementation depending on different metrics of the target platform

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 20 / 70

slide-37
SLIDE 37

Weight of An Algorithm

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 21 / 70

slide-38
SLIDE 38

Weight of An Algorithm

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 22 / 70

slide-39
SLIDE 39

Weight of An Algorithm

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 23 / 70

slide-40
SLIDE 40

Weight of An Algorithm

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 24 / 70

slide-41
SLIDE 41

Weight of An Algorithm

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 25 / 70

slide-42
SLIDE 42

General Purpose Crypto vs Lightweight Crypto

General Purpose Crypto Used in several applications A proper trade-off of various metric: area, speed, throughput, energy etc Lightweight Crypto Used for dedicated resource constraint environment Lack of Crypto standards suitable for such devices.

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 26 / 70

slide-43
SLIDE 43

NIST LwC Project

III: A Brief Overview on NIST LwC Project

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 27 / 70

slide-44
SLIDE 44

NIST LwC Project

NIST LwC Project: Timeline

Aug 2018: Call for Algorithms Mar 2019: First Round Submission Aug 2019: Declaration of Second Round Candidates Sep 2019: Second Round Submission Dec 2020: Declaration of Third Round Candidates End of 2021: Final Portfolio

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 28 / 70

slide-45
SLIDE 45

NIST LwC Project

NIST LwC Project: Requirements

Perform significantly better in constrained environments (HW and SW platforms) Efficient for short messages Implementations should have cheap countermeasures against side channel attacks, and fault attacks Scope: AEAD with optional hashing functionality

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 29 / 70

slide-46
SLIDE 46

NIST LwC Project

NIST LwC First Round Candidates

Total 57 submissions in Round 1 (12 from India)

*Figure Courtesy: Meltem Sonmez Turan

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 30 / 70

slide-47
SLIDE 47

NIST LwC Project

NIST LwC Submission Statistics

*Figure Courtesy: Meltem Sonmez Turan

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 31 / 70

slide-48
SLIDE 48

NIST LwC Project

NIST LwC Second Round Candidates

Total 32 candidates moved to Round 2 (10 from India)

ACE ASCON COMET DryGASCON Elephant ESTATE ForkAE GIFT-COFB Gimli Grain-128 AEAD HyENA ISAP KNOT LOTUS-AEAD & LOCUS-AEAD mixFeed ORANGE Oribatida PHOTON-Beetle Pyjamask Romulus SAEAES Saturnin SKINNY-AEAD SPARKLE Spix SpoC Spook Subterrain 2.0 SUNDAE-GIFT TinyJAMBU WAGE Xoodyak

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 32 / 70

slide-49
SLIDE 49

NIST LwC Project

NIST LwC Second Round Candidates

Total 32 candidates moved to Round 2 (10 from India)

ACE ASCON COMET DryGASCON Elephant ESTATE ForkAE GIFT-COFB Gimli Grain-128 AEAD HyENA ISAP KNOT LOTUS-AEAD & LOCUS-AEAD mixFeed ORANGE Oribatida PHOTON-Beetle Pyjamask Romulus SAEAES Saturnin SKINNY-AEAD SPARKLE Spix SpoC Spook Subterrain 2.0 SUNDAE-GIFT TinyJAMBU WAGE Xoodyak

All the 10 submissions are co-designed by Prof. Mridul Nandi

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 32 / 70

slide-50
SLIDE 50

AEAD Mode Design: Different Approaches

IV: Lightweight AEAD: Features and Design

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 33 / 70

slide-51
SLIDE 51

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Single-Pass Make only one pass through the data, simultaneously doing what is needed to ensure both privacy and authenticity Computational cost for single-pass schemes are about half of a two-pass scheme, and hence efficient

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 34 / 70

slide-52
SLIDE 52

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Single-Pass Make only one pass through the data, simultaneously doing what is needed to ensure both privacy and authenticity Computational cost for single-pass schemes are about half of a two-pass scheme, and hence efficient Single Pass Two Pass

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 34 / 70

slide-53
SLIDE 53

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

On-line Encryption produces cipher-text blocks on the fly, and before subsequent plain-text blocks are known Ensures that no additional memory is needed to store intermediate results for later use Useful in real-time streaming protocols as it reduces the end-to-end latency

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 35 / 70

slide-54
SLIDE 54

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

On-line Encryption produces cipher-text blocks on the fly, and before subsequent plain-text blocks are known Ensures that no additional memory is needed to store intermediate results for later use Useful in real-time streaming protocols as it reduces the end-to-end latency On-line Not On-line

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 35 / 70

slide-55
SLIDE 55

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Parallel All the ciphertext blocks can be computed in parallel Allows both H/W and S/W acceleration proportional to the available computational unit Can have a fully pipelined implementation, reduces latency and provides high speed

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 36 / 70

slide-56
SLIDE 56

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Parallel All the ciphertext blocks can be computed in parallel Allows both H/W and S/W acceleration proportional to the available computational unit Can have a fully pipelined implementation, reduces latency and provides high speed Sequential Parallel

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 36 / 70

slide-57
SLIDE 57

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Inverse-Free Both the encryption and verified decryption algorithm does not invoke the inverse of the primitive. Saves significant area in combined encryption-decryption AEAD implementation

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 37 / 70

slide-58
SLIDE 58

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Inverse-Free Both the encryption and verified decryption algorithm does not invoke the inverse of the primitive. Saves significant area in combined encryption-decryption AEAD implementation Inverse-free Not Inverse-free

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 37 / 70

slide-59
SLIDE 59

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

State-size A theoretic estimate of the register size Directly corresponds to the size of memory State size should be as low as possible for area efficient designs

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 38 / 70

slide-60
SLIDE 60

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

State-size A theoretic estimate of the register size Directly corresponds to the size of memory State size should be as low as possible for area efficient designs State size: 3n + k bits State size: n + k bits

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 38 / 70

slide-61
SLIDE 61

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

High Rate Rate is defined as number of message blocks processed per primitive invocation Rate of an AEAD mode can be at most 1 Constructions with higher rate reduces latency, and particularly beneficial to obtain higher speed

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 39 / 70

slide-62
SLIDE 62

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

High Rate Rate is defined as number of message blocks processed per primitive invocation Rate of an AEAD mode can be at most 1 Constructions with higher rate reduces latency, and particularly beneficial to obtain higher speed Rate: 1 Rate: 0.5

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 39 / 70

slide-63
SLIDE 63

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Optimal (Primitive Invocation) Uses the minimum possible number of non-linear invocations The bound is given in [Chakraborti et al., JMC 18]:

Nonce based AEAD: (a + m + 1) Deterministic: (a + 2m)

Makes a construction efficient for short messages and reduces the latency

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 40 / 70

slide-64
SLIDE 64

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Optimal (Primitive Invocation) Uses the minimum possible number of non-linear invocations The bound is given in [Chakraborti et al., JMC 18]:

Nonce based AEAD: (a + m + 1) Deterministic: (a + 2m)

Makes a construction efficient for short messages and reduces the latency Efficient Static AD Processing In many scenarios, AD remain static over the course of a communications session Efficient static AD processing use a pre-processed computed value instead of whole computation

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 40 / 70

slide-65
SLIDE 65

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Nonce Misuse Resistance Provides security even if nonce is repeated, or even without nonce Well suited for lightweight applications where storing counter or generating random number may be difficult to implement

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 41 / 70

slide-66
SLIDE 66

AEAD Mode Design: Different Approaches Features of AEAD Modes

Some Relevant Features of AEAD Modes

Nonce Misuse Resistance Provides security even if nonce is repeated, or even without nonce Well suited for lightweight applications where storing counter or generating random number may be difficult to implement Integrity under RUP Verified Decryption: Plaintext is released after verification Small buffer size may force decryption algo to release plaintext before verification This gives an adversary additional power, which may be exploited for forging

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 41 / 70

slide-67
SLIDE 67

AEAD Mode Design: Different Approaches AEAD Mode Classification

Mode Classification

Parallel Mode Feedback based Mode SIV Mode Sponge Mode Stream Cipher Mode

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 42 / 70

slide-68
SLIDE 68

AEAD Mode Design: Different Approaches Parallel Modes

Parallel Modes

Inputs of the block ciphers depend on the message and not on the previous block cipher

  • utputs or cipher texts, hence parallelization in the computation between distinct block

cipher calls Typically Used in low-latency scenarios as well as for obtaining good performance from both high-speed hardware and commodity processors The parallel design allows to efficiently process subsequent message blocks exploiting the CPU pipeline and multi-threading techniques

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 43 / 70

slide-69
SLIDE 69

AEAD Mode Design: Different Approaches Parallel Modes

Parallel Modes: Design Principle

The design principles follow the ECB structure To ensure (i) privacy within a message and (ii) privacy within two messages, some additional masking state depending on the value of the nonce and the block number

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 44 / 70

slide-70
SLIDE 70

AEAD Mode Design: Different Approaches Parallel Modes

Parallel Modes: Design Principle

Typical Choices: Xor-Encrypt-Xor paradigm tweakable block ciphers with tweak defined as a pair (nonce, block number)

Figure: Parallel Mode of Encryption: (a) OCB, (b) ΘCB

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 45 / 70

slide-71
SLIDE 71

AEAD Mode Design: Different Approaches Parallel Modes

Example1: Pyjamask (OCB Style Encryption)

Block Cipher based, Parallel, Online, Rate-1 Birthday bound secure, No RUP Security

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 46 / 70

slide-72
SLIDE 72

AEAD Mode Design: Different Approaches Parallel Modes

Example2: Skinny AEAD (ΘCB Style Encryption)

Tweakable Block Cipher based, Parallel, Online, Rate-1 Birthday bound secure, No RUP Security

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 47 / 70

slide-73
SLIDE 73

AEAD Mode Design: Different Approaches Parallel Modes

Example3: LOCUS-AEAD (OCB Style with Intermediate checksum)

M1 ∆N ⊕

  • E1

KN,4

X1

  • E1

KN,12

W1 ∆N ⊕ C1 Mm−1 ∆N ⊕

  • Em−1

KN,4

Xm−1

  • Em−1

KN,12

Wm−1 ∆N ⊕ Cm−1 M ∆N ⊕

  • Em

KN,5

Xm

  • Em

KN,13

Wm ∆N Mm ⊕ Cm

· · ·

V⊕ ⊕ W⊕ ⊕ Mm

  • Em+1

KN,6

⊕ ∆N T ⊕ ∆N

Short-tweak TBC based, Parallel, Online Nonce-derived key for full security, Intermediate checksum to achieve RUP security

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 48 / 70

slide-74
SLIDE 74

AEAD Mode Design: Different Approaches Feedback based Modes

Feedback based Modes

One of the most popular method of constructing area-efficient block cipher based AE Uses an affine function that takes a block cipher output and a plain text block to produce the corresponding cipher text block and an updated state which is used as the next block cipher input Reduce the state memory, at the cost of losing parallelizability Typically inverse-free and area-efficient for combined enc-dec implementations

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 49 / 70

slide-75
SLIDE 75

AEAD Mode Design: Different Approaches Feedback based Modes

Basic Structure of the Mode

N EK

γ0

EK

γ1 γa−1

EK Y [a] A[0] S[0] A[1] S[1] A[a − 1] S[a − 1] Y [0] X[1] Y [1]

· · ·

Y [a]

ρ0

EK

ρ1 ρm−1

EK T M[0] C[0] M[1] C[1] M[m − 1] C[m − 1] S[a] S[a + 1] S[a + m − 1] X[a + 1] Y [a + 1]

· · ·

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 50 / 70

slide-76
SLIDE 76

AEAD Mode Design: Different Approaches Feedback based Modes

Types of Feedback

Figure: Hybrid Feedback functions: (a) PFB, (b) CFB, (c) OFB, (d) CoFB

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 51 / 70

slide-77
SLIDE 77

AEAD Mode Design: Different Approaches Feedback based Modes

Types of Hybrid Feedback

X[i − 1] M[i] ⌈X[i]⌉ ⌊X[i]⌋ EK

C[i] X[i − 1] M[i] ⌈X[i]⌉ ⌊X[i]⌋ EK

C[i] X[i − 1] M[i] ⌈X[i]⌉ ⌊X[i]⌋ EK

C[i]

Figure: (a) PFB+CFB, (b) OFB+CFB, (c) OFB+PFB

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 52 / 70

slide-78
SLIDE 78

AEAD Mode Design: Different Approaches Feedback based Modes

Investigating the Security of Rate-1 Feedback based AE

Encryption Decryption Additional states to achieve Security PFB CFB n-bits CFB PFB

  • OFB

OFB

  • CoFB

CoFB n/2-bits HyFB (CFB+PFB) HyFB (PFB+CFB) n/2-bits HyFB (CFB+OFB) HyFB (PFB+OFB)

  • HyFB (PFB+OFB)

HyFB (CFB+OFB)

  • From Combined to Hybrid: Making Feedback-based AE Even Smaller [Chakraborti et al.,

ToSC 2020] For any rate-1 feedback-based AE with additional state of τ-bits, there is an adversary that breaks the construction with query complexity 2τ

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 53 / 70

slide-79
SLIDE 79

AEAD Mode Design: Different Approaches Feedback based Modes

Example1: COFB (A Mode with Combined Feedback)

Y [4] Y [5] Y [6] EK EK EK X[4] X[6] X[5] M[2] M[3] mask∆(3, δA) mask∆(4, δA) mask∆(4, δA + δM) C[2] C[3] T ρ ρ1 M[1] Y [3] C[1] ρ ρ A[1] A[2] A[3] EK 0n/2 N Y [0] Y [1] Y [2] Y [3] ρ1 mask∆(1, 0) mask∆(2, 0) mask∆(2, δA) EK EK EK X[1] X[3] X[2] ρ1 ρ1

Inverse-free, Rate-1, Efficient AD Processing State size: 1.5n-bit (optimal for rate-1), XOR: 2n-bit

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 54 / 70

slide-80
SLIDE 80

AEAD Mode Design: Different Approaches Feedback based Modes

Example2: HyENA (A Mode with Hybrid Feedback)

X[0] EK HyFB+ EK HyFB+ HyFB+ X[a] A[0] 2∆ A[1] 22∆ A[a − 1] 2a+1∆ Y [0] X[1] Y [1]

· · ·

X[a] EK HyFB+ EK HyFB+ HyFB+ X[a + m] M[0] C[0] M[1] C[1] M[m − 1] C[m − 1] 2a+2∆ 2a+3∆ 3 · 2a+m∆ Y [a] X[a + 1] Y [a + 1]

· · ·

EK T ⌈X[a + m]⌉ ⌊X[a + m]⌋

Inverse-free, Rate-1, Efficient AD Processing State size: 1.5n-bit (optimal for rate-1), XOR: n-bit

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 55 / 70

slide-81
SLIDE 81

AEAD Mode Design: Different Approaches Feedback based Modes

Example3: SAEAES (A Block-cipher based Sponge Variant)

Inverse-free, Rate-1/2, Efficient AD Processing State size: n-bit (optimal irrespective of rate)

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 56 / 70

slide-82
SLIDE 82

AEAD Mode Design: Different Approaches SIV based Modes

SIV based Modes

Provide maximal robustness to a lack of proper randomness or secure state Follows MAC-then-Encrypt structure, and hence two pass mode Typically obtain single-state implementation Excellent choice for short message processing

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 57 / 70

slide-83
SLIDE 83

AEAD Mode Design: Different Approaches SIV based Modes

Design Principle

Follow the MAC-then-ENCRYPT structure A typical choice is CBC-type MAC (single-state implementation) follows by OTP or OFB with the tag as IV

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 58 / 70

slide-84
SLIDE 84

AEAD Mode Design: Different Approaches SIV based Modes

Example1: SUNDAE

Use CBC MAC with OFB encryption Single-state, Inverse-free, efficient for short messages

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 59 / 70

slide-85
SLIDE 85

AEAD Mode Design: Different Approaches SIV based Modes

Example2: ESTATE

N V A[1] A[a] E1

K

E0

K

E0

K

E2/3

K

⊕ ⊕

· · ·

V T M[1] M[m] E0

K

E0

K

E4/5

K

⊕ ⊕

· · ·

E0

K

E0

K

E0

K

⊕ ⊕ ⊕ T M[1] C[1] M[m − 1] C[m − 1] M[m] C[m]

· · ·

Single-state, Inverse-free, efficient for short messages Use tBC to ensure RUP security, optimal block-cipher invocations

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 60 / 70

slide-86
SLIDE 86

AEAD Mode Design: Different Approaches Sponge Modes

Sponge Modes

Use public permutation instead of keyed permutation Employs duplex mode of operation - absorbs the data and then squeeze the ciphertext Has the advantage of key agility: no key-scheduling

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 61 / 70

slide-87
SLIDE 87

AEAD Mode Design: Different Approaches Sponge Modes

Example1: ASCON (Simple Duplex type Sponge Mode)

Use simple duplex-sponge mode of operation with sponge rate 64-bit and sponge capacity 256-bit Achieves security of 128-bit

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 62 / 70

slide-88
SLIDE 88

AEAD Mode Design: Different Approaches Sponge Modes

Example2: PHOTON-Beetle (Duplex Sponge Mode with Feedback)

N K f f f ⊕ A1 · · · ⊕ ⊕ Aa 1/2 IV IV f f f f ρ M1 C1 · · · ⊕ Cm ρ Mm 1/2 T

Uses duplex-sponge mode with a feedback function ρ with sponge rate 128-bit and sponge capacity 128-bit ρ plays the key role to achieve 121-bit security keeping the sponge capacity to 128-bit

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 63 / 70

slide-89
SLIDE 89

AEAD Mode Design: Different Approaches Sponge Modes

Example3: Oribatida (Sponge with Ciphertext Masking)

A sponge with sponge rate 128-bit and sponge capacity 128-bit with 64-bit ciphertext masking The masking boosts the security and ensures resilience in RUP settings

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 64 / 70

slide-90
SLIDE 90

AEAD Mode Design: Different Approaches Stream Cipher Modes

Stream Cipher Modes

Use a stream-cipher encryption as the basic mode Used to design fast and energy-efficient AEAD Typically, no additional states are reserved, and hence area-efficient Excellent choice for long messages

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 65 / 70

slide-91
SLIDE 91

AEAD Mode Design: Different Approaches Stream Cipher Modes

Example1: Grain AEAD

Adopts the design of Grain-128 and Grain v1 and extends it for authentication

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 66 / 70

slide-92
SLIDE 92

AEAD Mode Design: Different Approaches Stream Cipher Modes

Example2: Elephant

Use public-permutation to generate the key stream

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 67 / 70

slide-93
SLIDE 93

AEAD Mode Design: Different Approaches Stream Cipher Modes

Classification of NIST Round-2 Candidates

Parallel Mode: LOTUS-AEAD and LOCUS-AEAD, PAEF (ForkAE), Pyjamask, SKINNY-AEAD Feedback based Mode: Comet, GIFT-COFB, HyENA, mixFeed, Romulus-N, SAEAES, SAEF (ForkAE), TinyJAMBU SIV Mode: ESTATE, Romulus-M, Sundae-GIFT Sponge Mode: ACE, Ascon, DryGASCON, Gimli, ISAP, KNOT, Orange, Oribatida, PHOTON-Beetle, Sparkle, Spix, Spoc, Spook, Subterrain, Wage, Xoodyak Stream Cipher Mode: Elephant, Grain-128 AEAD, Saturnin

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 68 / 70

slide-94
SLIDE 94

AEAD Mode Design: Different Approaches Summary

Summary

Authenticated Encryption - Motivation, Basic Idea

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 69 / 70

slide-95
SLIDE 95

AEAD Mode Design: Different Approaches Summary

Summary

Authenticated Encryption - Motivation, Basic Idea Lightweight Cryptography - Motivation

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 69 / 70

slide-96
SLIDE 96

AEAD Mode Design: Different Approaches Summary

Summary

Authenticated Encryption - Motivation, Basic Idea Lightweight Cryptography - Motivation NIST LwC Project - Timeline and Progress

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 69 / 70

slide-97
SLIDE 97

AEAD Mode Design: Different Approaches Summary

Summary

Authenticated Encryption - Motivation, Basic Idea Lightweight Cryptography - Motivation NIST LwC Project - Timeline and Progress Classification of AEAD Modes based on Design

Thank You..!!! Questions???

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 69 / 70

slide-98
SLIDE 98

AEAD Mode Design: Different Approaches Competition

Light-Weight Cipher Design Challenge 2020

Link: https://www.dsci.in/ncoe-light-weight-cipher-design-challenge-2020/

  • N. Datta (IAI, TCG CREST)

Lightweight Crypto and Classification of AEAD 70 / 70