reconsidering the security bound of aes gcm siv
play

Reconsidering the Security Bound of AES-GCM-SIV Tetsu Iwata 1 and - PowerPoint PPT Presentation

Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks Reconsidering the Security Bound of AES-GCM-SIV Tetsu Iwata 1 and Yannick Seurin 2 1 Nagoya University, Japan 2 ANSSI, France March 7, 2018 FSE 2018


  1. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks Reconsidering the Security Bound of AES-GCM-SIV Tetsu Iwata 1 and Yannick Seurin 2 1 Nagoya University, Japan 2 ANSSI, France March 7, 2018 — FSE 2018 T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 1 / 26

  2. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks Summary of the contribution • we reconsider the security of the AEAD scheme AES-GCM-SIV designed by Gueron, Langley, and Lindell • we identify flaws in the designers’ security analysis and propose a new security proof • our findings leads to significantly reduced security claims, especially for long messages • we propose a simple modification to the scheme (key derivation function) improving security without efficiency loss T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 2 / 26

  3. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks Summary of the contribution • we reconsider the security of the AEAD scheme AES-GCM-SIV designed by Gueron, Langley, and Lindell • we identify flaws in the designers’ security analysis and propose a new security proof • our findings leads to significantly reduced security claims, especially for long messages • we propose a simple modification to the scheme (key derivation function) improving security without efficiency loss T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 2 / 26

  4. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks Summary of the contribution • we reconsider the security of the AEAD scheme AES-GCM-SIV designed by Gueron, Langley, and Lindell • we identify flaws in the designers’ security analysis and propose a new security proof • our findings leads to significantly reduced security claims, especially for long messages • we propose a simple modification to the scheme (key derivation function) improving security without efficiency loss T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 2 / 26

  5. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks Summary of the contribution • we reconsider the security of the AEAD scheme AES-GCM-SIV designed by Gueron, Langley, and Lindell • we identify flaws in the designers’ security analysis and propose a new security proof • our findings leads to significantly reduced security claims, especially for long messages • we propose a simple modification to the scheme (key derivation function) improving security without efficiency loss T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 2 / 26

  6. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks Outline Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 3 / 26

  7. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks Outline Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 4 / 26

  8. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks History of (AES)-GCM-(SIV) AEAD schemes • GCM [MV04] • CTR encryption + Wegman-Carter MAC • Encrypt-then-MAC composition • widely deployed, not nonce-misuse resistant [Jou06, BZD + 16] • GCM-SIV [GL15] • same components as GCM • Synthetic IV (SIV) composition [RS06] • nonce-misuse resistant • AES-GCM-SIV [GLL16, GLL17] • � = GCM-SIV instantiated with AES • similar to GCM-SIV but three modifications: • universal hash function (POLYVAL instead of GHASH) • full-block counter • nonce-based key derivation ( K , N ) �→ ( K polyval , K BC ) • proposed for standardization at IETF CFRG T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 5 / 26

  9. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks History of (AES)-GCM-(SIV) AEAD schemes • GCM [MV04] • CTR encryption + Wegman-Carter MAC • Encrypt-then-MAC composition • widely deployed, not nonce-misuse resistant [Jou06, BZD + 16] • GCM-SIV [GL15] • same components as GCM • Synthetic IV (SIV) composition [RS06] • nonce-misuse resistant • AES-GCM-SIV [GLL16, GLL17] • � = GCM-SIV instantiated with AES • similar to GCM-SIV but three modifications: • universal hash function (POLYVAL instead of GHASH) • full-block counter • nonce-based key derivation ( K , N ) �→ ( K polyval , K BC ) • proposed for standardization at IETF CFRG T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 5 / 26

  10. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks History of (AES)-GCM-(SIV) AEAD schemes • GCM [MV04] • CTR encryption + Wegman-Carter MAC • Encrypt-then-MAC composition • widely deployed, not nonce-misuse resistant [Jou06, BZD + 16] • GCM-SIV [GL15] • same components as GCM • Synthetic IV (SIV) composition [RS06] • nonce-misuse resistant • AES-GCM-SIV [GLL16, GLL17] • � = GCM-SIV instantiated with AES • similar to GCM-SIV but three modifications: • universal hash function (POLYVAL instead of GHASH) • full-block counter • nonce-based key derivation ( K , N ) �→ ( K polyval , K BC ) • proposed for standardization at IETF CFRG T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 5 / 26

  11. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks History of (AES)-GCM-(SIV) AEAD schemes • GCM [MV04] • CTR encryption + Wegman-Carter MAC • Encrypt-then-MAC composition • widely deployed, not nonce-misuse resistant [Jou06, BZD + 16] • GCM-SIV [GL15] • same components as GCM • Synthetic IV (SIV) composition [RS06] • nonce-misuse resistant • AES-GCM-SIV [GLL16, GLL17] • � = GCM-SIV instantiated with AES • similar to GCM-SIV but three modifications: • universal hash function (POLYVAL instead of GHASH) • full-block counter • nonce-based key derivation ( K , N ) �→ ( K polyval , K BC ) • proposed for standardization at IETF CFRG T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 5 / 26

  12. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks History of (AES)-GCM-(SIV) AEAD schemes • GCM [MV04] • CTR encryption + Wegman-Carter MAC • Encrypt-then-MAC composition • widely deployed, not nonce-misuse resistant [Jou06, BZD + 16] • GCM-SIV [GL15] • same components as GCM • Synthetic IV (SIV) composition [RS06] • nonce-misuse resistant • AES-GCM-SIV [GLL16, GLL17] • � = GCM-SIV instantiated with AES • similar to GCM-SIV but three modifications: • universal hash function (POLYVAL instead of GHASH) • full-block counter • nonce-based key derivation ( K , N ) �→ ( K polyval , K BC ) • proposed for standardization at IETF CFRG T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 5 / 26

  13. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks History of (AES)-GCM-(SIV) AEAD schemes • GCM [MV04] • CTR encryption + Wegman-Carter MAC • Encrypt-then-MAC composition • widely deployed, not nonce-misuse resistant [Jou06, BZD + 16] • GCM-SIV [GL15] • same components as GCM • Synthetic IV (SIV) composition [RS06] • nonce-misuse resistant • AES-GCM-SIV [GLL16, GLL17] • � = GCM-SIV instantiated with AES • similar to GCM-SIV but three modifications: • universal hash function (POLYVAL instead of GHASH) • full-block counter • nonce-based key derivation ( K , N ) �→ ( K polyval , K BC ) • proposed for standardization at IETF CFRG T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 5 / 26

  14. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks History of (AES)-GCM-(SIV) AEAD schemes • GCM [MV04] • CTR encryption + Wegman-Carter MAC • Encrypt-then-MAC composition • widely deployed, not nonce-misuse resistant [Jou06, BZD + 16] • GCM-SIV [GL15] • same components as GCM • Synthetic IV (SIV) composition [RS06] • nonce-misuse resistant • AES-GCM-SIV [GLL16, GLL17] • � = GCM-SIV instantiated with AES • similar to GCM-SIV but three modifications: • universal hash function (POLYVAL instead of GHASH) • full-block counter • nonce-based key derivation ( K , N ) �→ ( K polyval , K BC ) • proposed for standardization at IETF CFRG T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 5 / 26

  15. Background on AES-GCM-SIV Fixing the Security Bound Improving Key Derivation Final Remarks History of (AES)-GCM-(SIV) AEAD schemes • GCM [MV04] • CTR encryption + Wegman-Carter MAC • Encrypt-then-MAC composition • widely deployed, not nonce-misuse resistant [Jou06, BZD + 16] • GCM-SIV [GL15] • same components as GCM • Synthetic IV (SIV) composition [RS06] • nonce-misuse resistant • AES-GCM-SIV [GLL16, GLL17] • � = GCM-SIV instantiated with AES • similar to GCM-SIV but three modifications: • universal hash function (POLYVAL instead of GHASH) • full-block counter • nonce-based key derivation ( K , N ) �→ ( K polyval , K BC ) • proposed for standardization at IETF CFRG T. Iwata and Y. Seurin Reconsidering AES-GCM-SIV’s Security FSE 2018 5 / 26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend