Security of Symmetric Encryption in the Presence of Ciphertext - - PowerPoint PPT Presentation

security of symmetric encryption in the presence of
SMART_READER_LITE
LIVE PREVIEW

Security of Symmetric Encryption in the Presence of Ciphertext - - PowerPoint PPT Presentation

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation Alexandra Boldyreva, Jean Paul Degabriele , Kenny


slide-1
SLIDE 1

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

Alexandra Boldyreva, Jean Paul Degabriele, Kenny Paterson, and Martijn Stam EUROCRYPT - 19th April 2012

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 1/18

slide-2
SLIDE 2

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Outline of this Talk

1

Ciphertext Fragmentation and Related Problems

2

Formalizing Fragmentation

3

Security Notions

4

Constructions and Comparison

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 2/18

slide-3
SLIDE 3

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

slide-4
SLIDE 4

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

slide-5
SLIDE 5

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

slide-6
SLIDE 6

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

slide-7
SLIDE 7

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

slide-8
SLIDE 8

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Why Should We Care?

This setting emerges in practice, where encryption schemes have to operate under such conditions. One such instance is that of secure network protocols. However this is NOT captured by the security models currently used in cryptographic theory! Ciphertext fragmentation has given rise to a class of attacks that proved to be fatal in certain cases. This has left a gap between cryptographic theory and practice.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 4/18

slide-9
SLIDE 9

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Ciphertext-Fragmentation Attacks

SSH: A proof of security (IND-sfCCA) for SSH was given in [BKN 04]. Yet [APW 09] presented plaintext-recovery attacks against SSH. IPsec in MAC-then-encrypt (CBC): [Kra 01] proves that MAC-then-encrypt with CBC encryption is secure (secure channel [CK 01]). [MT 10] show that MAC-then-encode-then-encrypt (injective / CBC) is secure (secure channel [Mau 11]). [DP 10] present ciphertext-fragmentation attacks against such IPsec configurations.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 5/18

slide-10
SLIDE 10

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Ciphertext-Fragmentation Attacks

SSH: A proof of security (IND-sfCCA) for SSH was given in [BKN 04]. Yet [APW 09] presented plaintext-recovery attacks against SSH. IPsec in MAC-then-encrypt (CBC): [Kra 01] proves that MAC-then-encrypt with CBC encryption is secure (secure channel [CK 01]). [MT 10] show that MAC-then-encode-then-encrypt (injective / CBC) is secure (secure channel [Mau 11]). [DP 10] present ciphertext-fragmentation attacks against such IPsec configurations.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 5/18

slide-11
SLIDE 11

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Ciphertext-Fragmentation Attacks

SSH: A proof of security (IND-sfCCA) for SSH was given in [BKN 04]. Yet [APW 09] presented plaintext-recovery attacks against SSH. IPsec in MAC-then-encrypt (CBC): [Kra 01] proves that MAC-then-encrypt with CBC encryption is secure (secure channel [CK 01]). [MT 10] show that MAC-then-encode-then-encrypt (injective / CBC) is secure (secure channel [Mau 11]). [DP 10] present ciphertext-fragmentation attacks against such IPsec configurations.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 5/18

slide-12
SLIDE 12

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

The SSH Attack (Main Idea)

SSH encrypts messages in the following format:

> 4 bytes Packet Length Padding Length Sequence Number Payload Padding ENCRYPT MAC Ciphertext Message MAC tag Ciphertext Packet 4 bytes 4 bytes 1 byte

SSH commonly uses CBC mode for encryption.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 6/18

slide-13
SLIDE 13

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

The SSH Attack (Main Idea)

Intercepted Ciphertext

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

slide-14
SLIDE 14

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

slide-15
SLIDE 15

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption c∗

i

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

slide-16
SLIDE 16

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

?

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

slide-17
SLIDE 17

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

?

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

slide-18
SLIDE 18

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

⊥MAC

?

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

slide-19
SLIDE 19

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

⊥MAC

? L

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

slide-20
SLIDE 20

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

⊥MAC

L L

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

slide-21
SLIDE 21

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Related Work

A first step towards analyzing security in the presence of ciphertext fragmentation was made by Paterson and Watson in 2010. They show that when CBC mode is replaced with (stateful) counter mode SSH is secure. However their security notion is closely tied to SSH, and hence it is not generally applicable to other schemes. At first glance, ciphertext fragmentation may show some resemblance to online encryption. We emphasize that there are some important differences, and the two settings are disjoint.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 8/18

slide-22
SLIDE 22

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Our Contribution

We define a syntax and security notions for encryption in the fragmented setting. We provide generic constructions of fragmented schemes that meet our security notions, from normal “atomic” schemes. We formalize other security goals that practical schemes commonly aim to achieve: boundary-hiding and robustness against fragmentation-related DoS attacks. We construct a scheme, InterMAC, that meets all three of our security notions.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 9/18

slide-23
SLIDE 23

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Syntax

A fragmented symmetric encryption scheme SE = (K, E, D) with associated message space M = {0, 1}∗ and ciphertext space C = {0, 1}∗, is a triple of algorithms such that: (K, σ0, τ0) ← K where σ0 and τ0 are the respective initial states for encryption and decryption. (c, σi+1) ← EK(m, σi) where EK(·) can be probabilistic, stateful,

  • r both (σ = ε for stateless); m ∈ M, c ∈ C.

(m, τi+1) ← DK(f, τi) where DK(·) is deterministic and stateful; f ∈ {0, 1}∗ and m ∈ ({0, 1} ∪ S⊥ ∪ {¶})∗.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 10/18

slide-24
SLIDE 24

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Syntax

A fragmented symmetric encryption scheme SE = (K, E, D) with associated message space M = {0, 1}∗ and ciphertext space C = {0, 1}∗, is a triple of algorithms such that: (K, σ0, τ0) ← K where σ0 and τ0 are the respective initial states for encryption and decryption. (c, σi+1) ← EK(m, σi) where EK(·) can be probabilistic, stateful,

  • r both (σ = ε for stateless); m ∈ M, c ∈ C.

(m, τi+1) ← DK(f, τi) where DK(·) is deterministic and stateful; f ∈ {0, 1}∗ and m ∈ ({0, 1} ∪ S⊥ ∪ {¶})∗.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 10/18

slide-25
SLIDE 25

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Syntax

A fragmented symmetric encryption scheme SE = (K, E, D) with associated message space M = {0, 1}∗ and ciphertext space C = {0, 1}∗, is a triple of algorithms such that: (K, σ0, τ0) ← K where σ0 and τ0 are the respective initial states for encryption and decryption. (c, σi+1) ← EK(m, σi) where EK(·) can be probabilistic, stateful,

  • r both (σ = ε for stateless); m ∈ M, c ∈ C.

(m, τi+1) ← DK(f, τi) where DK(·) is deterministic and stateful; f ∈ {0, 1}∗ and m ∈ ({0, 1} ∪ S⊥ ∪ {¶})∗.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 10/18

slide-26
SLIDE 26

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Syntax

A fragmented symmetric encryption scheme SE = (K, E, D) with associated message space M = {0, 1}∗ and ciphertext space C = {0, 1}∗, is a triple of algorithms such that: (K, σ0, τ0) ← K where σ0 and τ0 are the respective initial states for encryption and decryption. (c, σi+1) ← EK(m, σi) where EK(·) can be probabilistic, stateful,

  • r both (σ = ε for stateless); m ∈ M, c ∈ C.

(m, τi+1) ← DK(f, τi) where DK(·) is deterministic and stateful; f ∈ {0, 1}∗ and m ∈ ({0, 1} ∪ S⊥ ∪ {¶})∗.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 10/18

slide-27
SLIDE 27

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Correctness Requirement

(explained pictorially) m1 m2 m3

Then m1 || ¶ || m2 || ¶ || m3 || ¶ is a prefix of m′

1 || m′ 2 || m′ 3 || m′ 4 || m′ 5.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 11/18

slide-28
SLIDE 28

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Correctness Requirement

(explained pictorially) m1 m2 m3 EK(·)

Then m1 || ¶ || m2 || ¶ || m3 || ¶ is a prefix of m′

1 || m′ 2 || m′ 3 || m′ 4 || m′ 5.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 11/18

slide-29
SLIDE 29

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Correctness Requirement

(explained pictorially) m1 m2 m3 EK(·)

Then m1 || ¶ || m2 || ¶ || m3 || ¶ is a prefix of m′

1 || m′ 2 || m′ 3 || m′ 4 || m′ 5.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 11/18

slide-30
SLIDE 30

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Correctness Requirement

(explained pictorially) m1 m2 m3 EK(·)

Then m1 || ¶ || m2 || ¶ || m3 || ¶ is a prefix of m′

1 || m′ 2 || m′ 3 || m′ 4 || m′ 5.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 11/18

slide-31
SLIDE 31

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Correctness Requirement

(explained pictorially) m1 m2 m3 EK(·)

Then m1 || ¶ || m2 || ¶ || m3 || ¶ is a prefix of m′

1 || m′ 2 || m′ 3 || m′ 4 || m′ 5.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 11/18

slide-32
SLIDE 32

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Correctness Requirement

(explained pictorially) m1 m2 m3 EK(·)

Then m1 || ¶ || m2 || ¶ || m3 || ¶ is a prefix of m′

1 || m′ 2 || m′ 3 || m′ 4 || m′ 5.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 11/18

slide-33
SLIDE 33

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Correctness Requirement

(explained pictorially) m1 m2 m3 m′

1

m′

2

m′

3

m′

4

m′

5

EK(·) DK(·)

Then m1 || ¶ || m2 || ¶ || m3 || ¶ is a prefix of m′

1 || m′ 2 || m′ 3 || m′ 4 || m′ 5.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 11/18

slide-34
SLIDE 34

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Correctness Requirement

(explained pictorially) m1 m2 m3 m′

1

m′

2

m′

3

m′

4

m′

5

EK(·) DK(·)

Then m1 || ¶ || m2 || ¶ || m3 || ¶ is a prefix of m′

1 || m′ 2 || m′ 3 || m′ 4 || m′ 5.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 11/18

slide-35
SLIDE 35

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Chosen-Fragment Security

IND-sfCCA [BKN 04] extends IND-CCA to protect against replay and out-of-order delivery attack. We extend IND-sfCCA to the fragmented setting, IND-sfCFA (Chosen Fragment Attack). We provide a generic construction for transforming an atomic scheme into a fragmented scheme. Starting from an atomic IND-sfCCA secure scheme, and a prefix-free encoding, the construction gives a fragmented scheme that is IND-sfCFA secure.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 12/18

slide-36
SLIDE 36

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Chosen-Fragment Security

IND-sfCCA [BKN 04] extends IND-CCA to protect against replay and out-of-order delivery attack. We extend IND-sfCCA to the fragmented setting, IND-sfCFA (Chosen Fragment Attack). We provide a generic construction for transforming an atomic scheme into a fragmented scheme. Starting from an atomic IND-sfCCA secure scheme, and a prefix-free encoding, the construction gives a fragmented scheme that is IND-sfCFA secure.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 12/18

slide-37
SLIDE 37

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

End of the Story?

Our construction shows that Chosen-Fragment Security is not that hard to achieve! A closer look at the SSH example, reveals that its designers were aiming for more than just confidentiality. We formalize these security goals as: boundary-hiding and robustness against fragmentation-related DoS attacks. Meeting such security goals without compromising confidentiality is more difficult! - as exemplified by the details of the SSH attack.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 13/18

slide-38
SLIDE 38

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Boundary-Hiding

In the theoretical community it is often regarded as inevitable that a ciphertext leaks the message length. However in practice this is a real problem! Practical schemes employ some heuristic techniques in order to protect against traffic analysis [TV 11], [PRS 11], [DCRS 12]. As we saw earlier SSH encrypts the length field. This does not conceal the message length but can be seen as an attempt to hide ciphertext boundaries.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 14/18

slide-39
SLIDE 39

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Boundary-Hiding

BH-CPA (Informally): Given a concatenation of ciphertexts, no adversary can determine where the ciphertext boundaries lie. Correctness requires the decryption algorithm to determine ciphertext boundaries. Thus to achieve boundary-hiding, boundaries should be evident only if the secret key is known. We extend our earlier generic construction to also achieve BH-CPA by replacing the prefix-free encoding with a keyed prefix-free encoding. The notion is easily extended to the active setting: BH-sfCFA, but is more challenging to achieve.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 15/18

slide-40
SLIDE 40

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Denial of Service

The SSH standard (RFC 4253) suggests limiting the maximum value of the length field in order to mitigate against certain denial-of-service attacks. Otherwise an adversary could alter the contents of the length field to indicate a very large value. The receiver would then interpret all subsequent ciphertexts as part of this large ciphertext – connection hang. Such denial-of-service attacks are not specific to SSH, but to encryption schemes supporting fragmentation in general. Informally a scheme is N-DOS-sfCFA secure, if no adversary can produce an N-bit long sequence of ciphertext fragments (not

  • utput by the encryption oracle) such that the decryption

algorithm returns ε throughout.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 16/18

slide-41
SLIDE 41

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Denial of Service

The SSH standard (RFC 4253) suggests limiting the maximum value of the length field in order to mitigate against certain denial-of-service attacks. Otherwise an adversary could alter the contents of the length field to indicate a very large value. The receiver would then interpret all subsequent ciphertexts as part of this large ciphertext – connection hang. Such denial-of-service attacks are not specific to SSH, but to encryption schemes supporting fragmentation in general. Informally a scheme is N-DOS-sfCFA secure, if no adversary can produce an N-bit long sequence of ciphertext fragments (not

  • utput by the encryption oracle) such that the decryption

algorithm returns ε throughout.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 16/18

slide-42
SLIDE 42

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Comparing Constructions

Scheme IND-sfCFA BH-CPA BH-sfCFA N-DOS-sfCFA

N < max

m∈M(|m|)

SSH-CBC

✘ ✔ ✘ ✘

SSH-CTR

✔ ✔ ✘ ✘

PF

✔ ✘ ✘ ✘

KPF

✔ ✔ ✘ ✘

InterMAC

✔ ✔ ✔ ✔

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 17/18

slide-43
SLIDE 43

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison

Concluding Remarks

Our work provides a general framework for analyzing the security of symmetric encryption schemes over fragmented channels. We describe practical constructions using standard primitives, showing that security in the presence of ciphertext fragmentation can be achieved efficiently and from standard assumptions. A full version will be available soon on eprint.

Boldyreva, Degabriele, Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 18/18