Linking OAE and Blockwise Attack Models Fast Software Encryption - - PowerPoint PPT Presentation

linking oae and blockwise attack models
SMART_READER_LITE
LIVE PREVIEW

Linking OAE and Blockwise Attack Models Fast Software Encryption - - PowerPoint PPT Presentation

Linking OAE and Blockwise Attack Models Fast Software Encryption 2017 Guillaume Endignoux 1 , 2 , Damian Vizr 1 1 EPFL, Switzerland 2 Kudelski Security Wednesday 8 th March, 2017 This work was partially supported by Microsoft Research. G.


slide-1
SLIDE 1

Linking OAE and Blockwise Attack Models

Fast Software Encryption 2017 Guillaume Endignoux1,2, Damian Vizár1

1EPFL, Switzerland 2Kudelski Security

Wednesday 8th March, 2017

This work was partially supported by Microsoft Research.

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 1 / 20

slide-2
SLIDE 2

Introduction

Authenticated encryption: confidentiality & authentication in one primitive. Ongoing CAESAR competition on authenticated encryption (2014 – 2017)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 2 / 20

slide-3
SLIDE 3

Introduction

Authenticated encryption: confidentiality & authentication in one primitive. Ongoing CAESAR competition on authenticated encryption (2014 – 2017) ⇒ most proposed schemes are online. M[1] ... M[j] ... M[n] C[1] ... C[j] ... C[n] Online authenticated encryption: computable on the fly, constant memory.

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 2 / 20

slide-4
SLIDE 4

Introduction

Security notions to capture AE: AE with associated data (AEAD) [Rogaway, 2002] Nonce-misuse resistant AE (MRAE) [Rogaway et al., 2006] ⇒ cannot be online! Online nonce-misuse resistant AE (OAE) [Fleischmann et al., 2012] Older notions for blockwise-adaptive adversaries [Fouque et al., 2003] ⇒ What are the relations between these notions?

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 3 / 20

slide-5
SLIDE 5

Introduction

Security notions to capture AE: AE with associated data (AEAD) [Rogaway, 2002] Nonce-misuse resistant AE (MRAE) [Rogaway et al., 2006] ⇒ cannot be online! Online nonce-misuse resistant AE (OAE) [Fleischmann et al., 2012] Older notions for blockwise-adaptive adversaries [Fouque et al., 2003] ⇒ What are the relations between these notions? Main contribution: we prove equivalence between OAE and blockwise notions, modulo new PR-TAG notion.

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 3 / 20

slide-6
SLIDE 6

Online authenticated encryption

We consider the setting of [Fleischmann et al., 2012] Online authenticated encryption scheme Π = (K, E, D) finite key space K deterministic algorithms E and D E H M K C, T D H C, T K M ∨ ⊥ Required properties: correctness: D(K, H, E(K, H, M)) = M

  • nlineness: Core ◦ E(K, H, ·) ∈ OPerm[n]
  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 4 / 20

slide-7
SLIDE 7

Online authenticated encryption

M[1] ... M[j] ... M[n] C[1] ... C[j] ... C[n] T H blocks of n bits Bn = {0, 1}n message space B∗

n

header space H (e.g. {0, 1}∗) = nonce + associated data tag space T = Bτ (τ bits) ciphertext space C = B∗

n × T (core ciphertext blocks + authentication

tag)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 5 / 20

slide-8
SLIDE 8

Online authenticated encryption

We model encryption by online permutations of B∗

n.

M[1] ... M[j] ... M[n] C[1] ... C[j] ... C[n] π ∈ OPerm[n] C[j] depends only on M[1], . . . , M[j].

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 6 / 20

slide-9
SLIDE 9

Security notions

We consider the following notions: OAE [Fleischmann et al., 2012] blockwise privacy [Fouque et al., 2003-2004] blockwise integrity [Fouque et al., 2003]

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 7 / 20

slide-10
SLIDE 10

Security notions

We consider the following notions: OAE [Fleischmann et al., 2012] ⇒ indistinguishability from idealized primitive blockwise privacy [Fouque et al., 2003-2004] ⇒ left-or-right sequential blockwise CPA blockwise integrity [Fouque et al., 2003] ⇒ existential forgery of ciphertext

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 7 / 20

slide-11
SLIDE 11

OAE security

Game OAE-REAL proc Initialize K

$

← K proc Enc(H, M) return E(K, H, M) proc Dec(H, C) return D(K, H, C)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 8 / 20

slide-12
SLIDE 12

OAE security

Game OAE-REAL proc Initialize K

$

← K proc Enc(H, M) return E(K, H, M) proc Dec(H, C) return D(K, H, C) Game OAE-IDEAL proc Initialize for all H ∈ H do πH

$

← OPerm[n] for all (H, M) ∈ H × B∗

n do

TH,M

$

← T proc Enc(H, M) return (πH(M), TH,M) proc Dec(H, C) return ⊥

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 8 / 20

slide-13
SLIDE 13

OAE security

Game OAE-REAL proc Initialize K

$

← K proc Enc(H, M) return E(K, H, M) proc Dec(H, C) return D(K, H, C) Game OAE-IDEAL proc Initialize for all H ∈ H do πH

$

← OPerm[n] for all (H, M) ∈ H × B∗

n do

TH,M

$

← T proc Enc(H, M) return (πH(M), TH,M) proc Dec(H, C) return ⊥ AdvOAE

Π

(A ) = Pr[A OAE-REAL

Π

⇒ 1] − Pr[A OAE-IDEAL

Π

⇒ 1]

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 8 / 20

slide-14
SLIDE 14

Blockwise privacy

Game LORS-BCPA proc Initialize K

$

← K b

$

← {0, 1}

  • H ← ⊥;
  • M ← ε;

j ← 0 proc LR(H, P0, P1) if H = ⊥ then H ← H

  • M ←

M||Pb C ← Core(E(K, H, M)) j ← j + 1 return C[j]

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 9 / 20

slide-15
SLIDE 15

Blockwise privacy

Game LORS-BCPA proc Initialize K

$

← K b

$

← {0, 1}

  • H ← ⊥;
  • M ← ε;

j ← 0 proc LR(H, P0, P1) if H = ⊥ then H ← H

  • M ←

M||Pb C ← Core(E(K, H, M)) j ← j + 1 return C[j] proc GetTag(H) if H = ⊥ then H ← H T ← Tag(E(K, H, M))

  • H ← ⊥;
  • M ← ε;

j ← 0 return T proc Finalize(d) return d = b

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 9 / 20

slide-16
SLIDE 16

Blockwise privacy

Game LORS-BCPA proc Initialize K

$

← K b

$

← {0, 1}

  • H ← ⊥;
  • M ← ε;

j ← 0 proc LR(H, P0, P1) if H = ⊥ then H ← H

  • M ←

M||Pb C ← Core(E(K, H, M)) j ← j + 1 return C[j] proc GetTag(H) if H = ⊥ then H ← H T ← Tag(E(K, H, M))

  • H ← ⊥;
  • M ← ε;

j ← 0 return T proc Finalize(d) return d = b AdvD-LORS-BCPA

Π

(A ) = 2 · Pr[A LORS-BCPA

Π

⇒ 1] − 1

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 9 / 20

slide-17
SLIDE 17

Blockwise privacy: deterministic schemes?

Issue with deterministic left-or-right indistinguishability: trivial attacks possible. L0 L1 R0 R1 L0 L2 R2 R3 Query a Query b ⇒ Compare Ca[0] and Cb[0] to distinguish between left and right.

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 10 / 20

slide-18
SLIDE 18

Blockwise privacy: deterministic schemes?

We define the online-respecting condition to avoid these attacks. Valid adversaries must respect it. LLCP(La, Lb)1 = LLCP(Ra, Rb) if Ha = Hb La[1] ... La[j] ... La[n] Ra[1] ... Ra[j] ... Ra[n] Lb[1] ... Lb[j] ... Lb[p] Rb[1] ... Rb[j] ... Rb[p] Equivalently (Proposition 1): ∃σH ∈ OPerm[n] s.t. Li = σHi(Ri)

1length of longest common prefix

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 11 / 20

slide-19
SLIDE 19

Blockwise integrity

Game B-INT-CTXT proc Initialize win ← 0 K

$

← K X ← ∅

  • H ← ⊥;
  • M ← ε;

j ← 0 proc Enc(H, P) if H = ⊥ then H ← H

  • M ←

M||P C ← Core(E(K, H, M)) j ← j + 1 return C[j]

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 12 / 20

slide-20
SLIDE 20

Blockwise integrity

Game B-INT-CTXT proc Initialize win ← 0 K

$

← K X ← ∅

  • H ← ⊥;
  • M ← ε;

j ← 0 proc Enc(H, P) if H = ⊥ then H ← H

  • M ←

M||P C ← Core(E(K, H, M)) j ← j + 1 return C[j] proc GetTag(H) if H = ⊥ then H ← H C ← E(K, H, M) X ← X ∪ {( H, C)}

  • H ← ⊥;
  • M ← ε;

j ← 0 return Tag(C) proc Dec(H, C) M ← D(K, H, C) if (H, C) ∈ X then M ← ⊥ if M = ⊥ then win ← 1 return M proc Finalize() return win

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 12 / 20

slide-21
SLIDE 21

Blockwise integrity

Game B-INT-CTXT proc Initialize win ← 0 K

$

← K X ← ∅

  • H ← ⊥;
  • M ← ε;

j ← 0 proc Enc(H, P) if H = ⊥ then H ← H

  • M ←

M||P C ← Core(E(K, H, M)) j ← j + 1 return C[j] proc GetTag(H) if H = ⊥ then H ← H C ← E(K, H, M) X ← X ∪ {( H, C)}

  • H ← ⊥;
  • M ← ε;

j ← 0 return Tag(C) proc Dec(H, C) M ← D(K, H, C) if (H, C) ∈ X then M ← ⊥ if M = ⊥ then win ← 1 return M proc Finalize() return win AdvB-INT-CTXT

Π

(A ) = Pr[A B-INT-CTXT

Π

⇒ 1]

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 12 / 20

slide-22
SLIDE 22

Main results

D-LORS-BCPA ∧ B-INT-CTXT OAE D-LORS-BCPA ∧ B-INT-CTXT ∧ PR-TAG

  • Prop. 2
  • Thms. 1, 2, 3
  • Thm. 4

Relations between notions shown in the paper.

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 13 / 20

slide-23
SLIDE 23

Theorem 1: OAE → D-LORS-BCPA

AD-LORS-BCPA M ← M||Pb j ← j + 1 M ← ǫ; j ← 0 b

$

← {0, 1} M ← ǫ; j ← 0 d d = b BOAE LR(H, P0, P1) C[j] Enc(H, M) C, T GetTag(H) T Enc(H, M) C, T Advantage: AdvD-LORS-BCPA

Π

(A ) = 2 · AdvOAE

Π

(B)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 14 / 20

slide-24
SLIDE 24

Proposition 2: D-LORS-BCPA ∧ B-INT-CTXT → OAE

We construct a counter-example E′ E H M K C, T C, T||1 E′

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 15 / 20

slide-25
SLIDE 25

Proposition 2: D-LORS-BCPA ∧ B-INT-CTXT → OAE

We construct a counter-example E′ E H M K C, T C, T||1 E′ E′ is as secure as E for D-LORS-BCPA and B-INT-CTXT.

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 15 / 20

slide-26
SLIDE 26

Proposition 2: D-LORS-BCPA ∧ B-INT-CTXT → OAE

We construct a counter-example E′ E H M K C, T C, T||1 E′ E′ is as secure as E for D-LORS-BCPA and B-INT-CTXT. The tag allows to distinguish real scheme from ideal scheme with probability 1

2.

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 15 / 20

slide-27
SLIDE 27

Proposition 2: D-LORS-BCPA ∧ B-INT-CTXT → OAE

We construct a counter-example E′ E H M K C, T C, T||1 E′ E′ is as secure as E for D-LORS-BCPA and B-INT-CTXT. The tag allows to distinguish real scheme from ideal scheme with probability 1

2.

Neither D-LORS-BCPA nor B-INT-CTXT enforce uniformly distributed tag.

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 15 / 20

slide-28
SLIDE 28

A novel notion: pseudo-random tag

PR-TAG = indistinguishability from real encryption + random tag

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 16 / 20

slide-29
SLIDE 29

A novel notion: pseudo-random tag

PR-TAG = indistinguishability from real encryption + random tag Game PR-TAG-REAL proc Initialize K

$

← K proc Enc(H, M) return E(K, H, M)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 16 / 20

slide-30
SLIDE 30

A novel notion: pseudo-random tag

PR-TAG = indistinguishability from real encryption + random tag Game PR-TAG-REAL proc Initialize K

$

← K proc Enc(H, M) return E(K, H, M) Game PR-TAG-IDEAL proc Initialize K

$

← K for all (H, M) ∈ H × B∗

n do

TH,M

$

← T proc Enc(H, M) C ← Core(E(K, H, M)) return (C, TH,M)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 16 / 20

slide-31
SLIDE 31

A novel notion: pseudo-random tag

PR-TAG = indistinguishability from real encryption + random tag Game PR-TAG-REAL proc Initialize K

$

← K proc Enc(H, M) return E(K, H, M) Game PR-TAG-IDEAL proc Initialize K

$

← K for all (H, M) ∈ H × B∗

n do

TH,M

$

← T proc Enc(H, M) C ← Core(E(K, H, M)) return (C, TH,M) AdvPR-TAG

Π

(A ) = Pr[A PR-TAG-REAL

Π

⇒ 1] − Pr[A PR-TAG-IDEAL

Π

⇒ 1]

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 16 / 20

slide-32
SLIDE 32

Theorem 4: D-LORS-BCPA ∧ B-INT-CTXT ∧ PR-TAG → OAE

AOAE E D Enc(H, M) Dec(H, C) AdvOAE

Π

(A ) = Pr[A OAE-REAL

Π

⇒ 1] − Pr[A OAE-IDEAL

Π

⇒ 1]

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 17 / 20

slide-33
SLIDE 33

Theorem 4: D-LORS-BCPA ∧ B-INT-CTXT ∧ PR-TAG → OAE

AOAE E ⊥ Enc(H, M) Dec(H, C) AdvOAE

Π

(A ) = Pr[A OAE-REAL

Π

⇒ 1] − Pr[A OAE-IDEAL

Π

⇒ 1] ≤ AdvB-INT-CTXT

Π

(Ac)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 17 / 20

slide-34
SLIDE 34

Theorem 4: D-LORS-BCPA ∧ B-INT-CTXT ∧ PR-TAG → OAE

AOAE Core ◦ E, TH,M ⊥ Enc(H, M) Dec(H, C) AdvOAE

Π

(A ) = Pr[A OAE-REAL

Π

⇒ 1] − Pr[A OAE-IDEAL

Π

⇒ 1] ≤ AdvB-INT-CTXT

Π

(Ac) + AdvPR-TAG

Π

(At)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 17 / 20

slide-35
SLIDE 35

Theorem 4: D-LORS-BCPA ∧ B-INT-CTXT ∧ PR-TAG → OAE

AOAE πH, TH,M ⊥ Enc(H, M) Dec(H, C) AdvOAE

Π

(A ) = Pr[A OAE-REAL

Π

⇒ 1] − Pr[A OAE-IDEAL

Π

⇒ 1] ≤ AdvB-INT-CTXT

Π

(Ac) + AdvPR-TAG

Π

(At) + AdvD-LORS-BCPA

Π

(Ap)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 17 / 20

slide-36
SLIDE 36

Theorem 4: reduction of D-LORS-BCPA

Reduction between D-LORS-BCPA adversary Ap and OAE adversary A ?

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 18 / 20

slide-37
SLIDE 37

Theorem 4: reduction of D-LORS-BCPA

Reduction between D-LORS-BCPA adversary Ap and OAE adversary A ? AOAE R ← σH(M) T ′ ← TH,M {} σH

$

← OPerm[n] TH,M

$

← T d Ap Enc(H, M) C, T ′ LR(H, R[j], M[j]) C[j] Dec(H, C) ⊥ Lemma 5: Core(E(K, H, σH(·))) is equivalent to πH

$

← OPerm[n]

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 18 / 20

slide-38
SLIDE 38

Conclusion

Reformulation of blockwise privacy for deterministic OAE schemes. Definition of online-respecting adversaries. Proposition of a new PR-TAG security notion. Proof of equivalence between OAE and blockwise notions: OAE ↔ D-LORS-BCPA ∧ B-INT-CTXT ∧ PR-TAG

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 19 / 20

slide-39
SLIDE 39

Conclusion

Reformulation of blockwise privacy for deterministic OAE schemes. Definition of online-respecting adversaries. Proposition of a new PR-TAG security notion. Proof of equivalence between OAE and blockwise notions: OAE ↔ D-LORS-BCPA ∧ B-INT-CTXT ∧ PR-TAG Open questions: Overlap between D-LORS-BCPA and PR-TAG? Minimality of PR-TAG?

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 19 / 20

slide-40
SLIDE 40

Conclusion Thank you for your attention!

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 20 / 20

slide-41
SLIDE 41

Bonus slides

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 21 / 20

slide-42
SLIDE 42

Theorem 2: OAE → B-INT-CTXT

AB-INT-CTXT M ← M||P j ← j + 1 M ← ǫ; j ← 0 if M = ⊥ then found ← 1 found ← 0 M ← ǫ; j ← 0 found BOAE Enc(H, P) C[j] Enc(H, M) C, T GetTag(H) T Enc(H, M) C, T Dec(H, C) M Dec(H, C) M Advantage: AdvB-INT-CTXT

Π

(A ) = AdvOAE

Π

(B)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 22 / 20

slide-43
SLIDE 43

Theorem 3: OAE → PR-TAG

APR-TAG T ′ ← TH,M TH,M

$

← T b 1 − b BOAE Enc(H, M) C, T ′ Enc(H, M) C, T Advantage: AdvPR-TAG

Π

(A ) = AdvOAE

Π

(A ) + AdvOAE

Π

(B) Pr[A PR-TAG-REAL

Π

⇒ 1] − Pr[A OAE-IDEAL

Π

⇒ 1] = AdvOAE

Π

(A ) Pr[A OAE-IDEAL

Π

⇒ 1]−Pr[A PR-TAG-IDEAL

Π

⇒ 1] = AdvOAE

Π

(B)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 23 / 20

slide-44
SLIDE 44

Theorem 3: OAE → PR-TAG

APR-TAG T ′ ← TH,M TH,M

$

← T b 1 − b BOAE Enc(H, M) C, T ′ Enc(H, M) C, T Advantage: AdvPR-TAG

Π

(A ) = AdvOAE

Π

(A ) + AdvOAE

Π

(B) Pr[A OAE-REAL

Π

⇒ 1] − Pr[A OAE-IDEAL

Π

⇒ 1] = AdvOAE

Π

(A ) Pr[A OAE-IDEAL

Π

⇒ 1] − Pr[A PR-TAG-IDEAL

Π

⇒ 1] = AdvOAE

Π

(B)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 23 / 20

slide-45
SLIDE 45

Theorem 3: OAE → PR-TAG

APR-TAG T ′ ← TH,M TH,M

$

← T b 1 − b BOAE Enc(H, M) C, T ′ Enc(H, M) C, T Advantage: AdvPR-TAG

Π

(A ) = AdvOAE

Π

(A ) + AdvOAE

Π

(B) Pr[A OAE-REAL

Π

⇒ 1] − Pr[A OAE-IDEAL

Π

⇒ 1] = AdvOAE

Π

(A ) Pr[BOAE-IDEAL

Π

⇒ 0] − Pr[BOAE-REAL

Π

⇒ 0] = AdvOAE

Π

(B)

  • G. Endignoux, D. Vizár (EPFL)

Linking OAE & blockwise attack models FSE 2017 23 / 20