PAEQ: Parallelizable Permutation-based Authenticated Encryption
Alex Biryukov and Dmitry Khovratovich
University of Luxembourg
PAEQ: Parallelizable Permutation-based Authenticated Encryption - - PowerPoint PPT Presentation
PAEQ: Parallelizable Permutation-based Authenticated Encryption Alex Biryukov and Dmitry Khovratovich University of Luxembourg 12 October 2014 Authenticated encryption Simple encryption If you just want to protect confidentiality of your
University of Luxembourg
X
EK
C encrypt
N
use and transmit
N Nonce Plaintext Ciphertext
X
EK
C encrypt
N
use and transmit
N Nonce Plaintext Ciphertext
X
EK
C T authenticate encrypt and
N
use and transmit
N Plaintext Ciphertext Tag
X
EK
C T authenticate encrypt and
N
use and transmit
N Plaintext Ciphertext Tag
M A
EK
C T A authenticate and bind authenticate encrypt and
N
use and transmit
N
AD Message Nonce
M A
EK
C T A authenticate and bind authenticate encrypt and
N
use and transmit
N
AD Message Nonce
M A
EK
C T A authenticate and bind authenticate encrypt and
N
use and transmit
N
AD Message Nonce
EK
K
F
K
F
K
F
EK
K
F
K
F
K
F
T K N 1 P1
F F
K
F
C1
truncation
K
F
A1 K
D5 if last block is paddedEncryption Binding associated data Authentication
K
key, k bits
N
nonce, r bits
1
counter, s bits
Pt Ct t′
Encryption of the last block of length t′
1
n − k − 16
k r + s ≥ 2k 16 16 k
D0k Z
D2k 16 r s
D4k
D6Di = (k, i + r (mod 256))
Y1 X1 W1 V1
n − k − 16
Nonce-misuse option
Q1
F
Q2 Qm
F
N r 2k P A 96 96 10∗1
plaintext length AD length plaintext AD sponge padding
Q:
K
key key length nonce length
16 16 K N 2 P2
F F
C2 k
D0 D2K N t Pt
F F
Ct k
D0 D2F
A2 K 2
D4F
Ap K p
D4K N t
F F
k
D1 D3K N 1 M1
F
N 2 M2
F
N t Mt
F
C1 C2 Ct K K r + s k
D0
k 16 r s
D0 D0
N t Mt
F
Ct K t′
D1
T
F F F
K
F
C1
truncation
K
F
A1 K
F F
D5 if last block is padded
1 16 k ≥ 2k k Z
D2 D4
k A2 K 2
D4
Ap K p
D4 D6
FK(N, 1) C2
D2
FK(N, 2) Ct
D2
FK(N, t) k ≥ 2k k k ≥ 2k
Π
Π (A) ≤ q
T K N 1 M1
F F
N 2 M2
F F
N t Mt
F F
K
F
C1 C2 Ct
truncation
K
F
A1 K
F F
D5 if last block is paddedEncryption Binding associated data Authentication
K
key, k bits
N
nonce, r bits
1
counter, s bits
K K 1 r + s k q + s r + s ≥ 2k q + s 16 16 16 k q + s r + s
D0k Z
D2k 16 r s
D0 D2 D0 D2 D4k A2 K 2
D4Ap K p
D4 D6Di = 256 · k + r + i
SB SRMC 1 SB SRMC 5 SB SRMC 2 SB SRMC 6 SB SRMC 3 SB SRMC 7 SB SRMC 4 SB SRMC 8
SB SRMC 1 SB SRMC 5 SB SRMC 2 SB SRMC 6 SB SRMC 3 SB SRMC 7 SB SRMC 4 SB SRMC 8