Stronger Security Guarantees for Authenticated Encryption Schemes - - PowerPoint PPT Presentation

stronger security guarantees for authenticated encryption
SMART_READER_LITE
LIVE PREVIEW

Stronger Security Guarantees for Authenticated Encryption Schemes - - PowerPoint PPT Presentation

Ciphertext Fragmentation Distinguishable Decryption Failures Stronger Security Guarantees for Authenticated Encryption Schemes Alexandra Boldyreva, Jean Paul Degabriele , Kenny Paterson, and Martijn Stam DIAC Workshop - 5th July 2012 Boldyreva,


slide-1
SLIDE 1

Ciphertext Fragmentation Distinguishable Decryption Failures

Stronger Security Guarantees for Authenticated Encryption Schemes

Alexandra Boldyreva, Jean Paul Degabriele, Kenny Paterson, and Martijn Stam DIAC Workshop - 5th July 2012

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 1/22

slide-2
SLIDE 2

Ciphertext Fragmentation Distinguishable Decryption Failures

Scope of This Talk

Arguably the best way we have of assessing the security of an Authenticated Encryption (AE) scheme is through its security proof. There are various criteria for assessing security proofs: security notion, tightness and quantitative bounds, assumptions, etc. but most importantly we want security to hold in in practice! This relates to how well our theoretic framework captures real-world scenarios. In this talk we consider two aspects that that current cryptographic theory fails to address. We here outline recent and upcoming work of ours to address these, and propose new design criteria for AE schemes.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 2/22

slide-3
SLIDE 3

Ciphertext Fragmentation Distinguishable Decryption Failures

Outline

1

Ciphertext Fragmentation

2

Distinguishable Decryption Failures

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 3/22

slide-4
SLIDE 4

Ciphertext Fragmentation Distinguishable Decryption Failures

Outline

1

Ciphertext Fragmentation

2

Distinguishable Decryption Failures

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 4/22

slide-5
SLIDE 5

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

slide-6
SLIDE 6

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

slide-7
SLIDE 7

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

slide-8
SLIDE 8

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

slide-9
SLIDE 9

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation Channel

Alice Bob

Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

slide-10
SLIDE 10

Ciphertext Fragmentation Distinguishable Decryption Failures

Why is it a Problem?

This setting emerges in practice, one such instance is that of secure network protocols. AE schemes are NOT designed to operate in this setting, and it is left to the protocol designer to adapt the scheme into one that supports ciphertext fragmentation (hoping that security is preserved). However as the following two examples show, security in the usual ‘atomic’ setting does not guarantee security in the fragmented setting.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 6/22

slide-11
SLIDE 11

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext-Fragmentation Attacks

SSH: A proof of security (IND-sfCCA) for SSH was given in [BKN 04]. Yet [APW 09] presented plaintext-recovery attacks against SSH. IPsec in MAC-then-encrypt (CBC): [Kra 01] proves that MAC-then-encrypt with CBC encryption is secure (secure channel [CK 01]). [MT 10] show that MAC-then-encode-then-encrypt (injective / CBC) is secure (secure channel [Mau 11]). [DP 10] present ciphertext-fragmentation attacks against such IPsec configurations.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 7/22

slide-12
SLIDE 12

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext-Fragmentation Attacks

SSH: A proof of security (IND-sfCCA) for SSH was given in [BKN 04]. Yet [APW 09] presented plaintext-recovery attacks against SSH. IPsec in MAC-then-encrypt (CBC): [Kra 01] proves that MAC-then-encrypt with CBC encryption is secure (secure channel [CK 01]). [MT 10] show that MAC-then-encode-then-encrypt (injective / CBC) is secure (secure channel [Mau 11]). [DP 10] present ciphertext-fragmentation attacks against such IPsec configurations.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 7/22

slide-13
SLIDE 13

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext-Fragmentation Attacks

SSH: A proof of security (IND-sfCCA) for SSH was given in [BKN 04]. Yet [APW 09] presented plaintext-recovery attacks against SSH. IPsec in MAC-then-encrypt (CBC): [Kra 01] proves that MAC-then-encrypt with CBC encryption is secure (secure channel [CK 01]). [MT 10] show that MAC-then-encode-then-encrypt (injective / CBC) is secure (secure channel [Mau 11]). [DP 10] present ciphertext-fragmentation attacks against such IPsec configurations.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 7/22

slide-14
SLIDE 14

Ciphertext Fragmentation Distinguishable Decryption Failures

The Case of SSH

SSH encrypts messages in the following format:

> 4 bytes Packet Length Padding Length Sequence Number Payload Padding ENCRYPT MAC Ciphertext Message MAC tag Ciphertext Packet 4 bytes 4 bytes 1 byte

SSH commonly uses CBC mode for encryption.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 8/22

slide-15
SLIDE 15

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

Intercepted Ciphertext

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

slide-16
SLIDE 16

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

slide-17
SLIDE 17

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption c∗

i

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

slide-18
SLIDE 18

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

?

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

slide-19
SLIDE 19

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

?

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

slide-20
SLIDE 20

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

⊥MAC

?

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

slide-21
SLIDE 21

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

⊥MAC

? L

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

slide-22
SLIDE 22

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗

i

Intercepted Ciphertext Submit for Decryption p∗

i

⊥MAC

L L

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

slide-23
SLIDE 23

Ciphertext Fragmentation Distinguishable Decryption Failures

Our Treatment of Fragmentation

From EUROCRYPT 12

We define a syntax and a correctness requirement for encryption in the fragmented setting. We introduce indistinguishability under chosen-fragment attacks. We identify and formalise two other security goals that arise in relation to ciphertext fragmentation. We construct a scheme, InterMAC, that meets all three of our security notions.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 10/22

slide-24
SLIDE 24

Ciphertext Fragmentation Distinguishable Decryption Failures

Chosen-Fragment Security

IND-sfCCA [BKN 04] extends IND-CCA to protect against replay and out-of-order delivery attack. We extend IND-sfCCA to the fragmented setting, IND-sfCFA (Chosen Fragment Attack). We provide a generic construction for transforming an atomic scheme into a fragmented scheme. Starting from an atomic IND-sfCCA secure scheme, and a prefix-free encoding, the construction gives a fragmented scheme that is IND-sfCFA secure.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 11/22

slide-25
SLIDE 25

Ciphertext Fragmentation Distinguishable Decryption Failures

Chosen-Fragment Security

IND-sfCCA [BKN 04] extends IND-CCA to protect against replay and out-of-order delivery attack. We extend IND-sfCCA to the fragmented setting, IND-sfCFA (Chosen Fragment Attack). We provide a generic construction for transforming an atomic scheme into a fragmented scheme. Starting from an atomic IND-sfCCA secure scheme, and a prefix-free encoding, the construction gives a fragmented scheme that is IND-sfCFA secure.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 11/22

slide-26
SLIDE 26

Ciphertext Fragmentation Distinguishable Decryption Failures

But There’s More!

Our construction shows that Chosen-Fragment Security is not that hard to achieve! Protocol designers aim to reduce susceptibility to Traffic

  • Analysis. Heuristic approach: Leak the least information

possible. Many mechanisms to support ciphertext fragmentation expose the scheme to fragmentation-related DoS attacks. Additionally meeting these security goals without compromising confidentiality is more difficult! - as exemplified by the details of the SSH attack.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 12/22

slide-27
SLIDE 27

Ciphertext Fragmentation Distinguishable Decryption Failures

Boundary Hiding

As noted earlier SSH encrypts the length field. This does not conceal the message length but does hide ciphertext boundaries (in the passive case). Boundary Hiding (Informally): Given a concatenation of ciphertexts, no adversary can determine where the ciphertext boundaries lie. Intuitively this captures (in part) a weak form of resilience against Traffic Analysis. Conflicting goals: intuitively to support ciphertext fragmentation (correctness), the decryption algorithm requires the ability to determine ciphertext boundaries.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 13/22

slide-28
SLIDE 28

Ciphertext Fragmentation Distinguishable Decryption Failures

Denial of Service

The SSH standard (RFC 4253) suggests limiting the maximum value of the length field in order to mitigate against certain denial-of-service attacks. Otherwise an adversary could alter the contents of the length field to indicate a very large value. The receiver would then interpret all subsequent ciphertexts as part of this large ciphertext – connection hang. Such denial-of-service attacks are not specific to SSH, but to encryption schemes supporting fragmentation in general. Informally a scheme is N-DOS-sfCFA secure, if no adversary can produce an N-bit long sequence of ciphertext fragments (not

  • utput by the encryption oracle) such that the decryption

algorithm returns ε throughout.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 14/22

slide-29
SLIDE 29

Ciphertext Fragmentation Distinguishable Decryption Failures

Denial of Service

The SSH standard (RFC 4253) suggests limiting the maximum value of the length field in order to mitigate against certain denial-of-service attacks. Otherwise an adversary could alter the contents of the length field to indicate a very large value. The receiver would then interpret all subsequent ciphertexts as part of this large ciphertext – connection hang. Such denial-of-service attacks are not specific to SSH, but to encryption schemes supporting fragmentation in general. Informally a scheme is N-DOS-sfCFA secure, if no adversary can produce an N-bit long sequence of ciphertext fragments (not

  • utput by the encryption oracle) such that the decryption

algorithm returns ε throughout.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 14/22

slide-30
SLIDE 30

Ciphertext Fragmentation Distinguishable Decryption Failures

Design Criteria I

Security Under Ciphertext Fragmentation

AE schemes are used extensively to secure communication over packet-based networks, such as TCP/IP . The channel over which the scheme has to operate is often a fragmentation channel. As such a good AE scheme should support or be easily extendible to operate over fragmentation channels. Specifically the scheme should preserve confidentiality (chosen-fragment security), and it should be robust against fragmentation-related DoS attacks (i.e. tunable to be N-DOS secure for a reasonable range of N values). We don’t consider Boundary Hiding to be essential, but it would be a nice additional feature.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 15/22

slide-31
SLIDE 31

Ciphertext Fragmentation Distinguishable Decryption Failures

Outline

1

Ciphertext Fragmentation

2

Distinguishable Decryption Failures

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 16/22

slide-32
SLIDE 32

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security Channel

Sender Receiver Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

slide-33
SLIDE 33

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security Channel

Sender Receiver Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

slide-34
SLIDE 34

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security Channel

Sender Receiver Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

slide-35
SLIDE 35

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security Channel

Sender Receiver Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

slide-36
SLIDE 36

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security Channel

Sender Receiver Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

slide-37
SLIDE 37

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security Channel

Sender Receiver Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

slide-38
SLIDE 38

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security Channel

Sender Receiver Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

slide-39
SLIDE 39

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security Channel

Sender Receiver Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

slide-40
SLIDE 40

Ciphertext Fragmentation Distinguishable Decryption Failures

A Gap in the Argument

Krawczyk’s proof can be extended to show that MAC-then-encrypt with CBC encryption is IND-CCA secure. Yet, attacks against TLS [CHVV 03], DTLS [AP 12], and IPsec [DP 10] have successfully managed to break instantiations of this construction through this type of attacks. PROBLEM: Our formalism implicitly assumes that an adversary cannot distinguish between decryption failures (Distinct decryption failures always return ⊥). We do not capture the fact that invalid ciphertexts may leak more information beyond their invalidity!

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 18/22

slide-41
SLIDE 41

Ciphertext Fragmentation Distinguishable Decryption Failures

A Gap in the Argument

Krawczyk’s proof can be extended to show that MAC-then-encrypt with CBC encryption is IND-CCA secure. Yet, attacks against TLS [CHVV 03], DTLS [AP 12], and IPsec [DP 10] have successfully managed to break instantiations of this construction through this type of attacks. PROBLEM: Our formalism implicitly assumes that an adversary cannot distinguish between decryption failures (Distinct decryption failures always return ⊥). We do not capture the fact that invalid ciphertexts may leak more information beyond their invalidity!

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 18/22

slide-42
SLIDE 42

Ciphertext Fragmentation Distinguishable Decryption Failures

Possible Remedies

Suggestion A: Ensure at the implementation stage that distinct decryption failures are indistinguishable. History shows that this is rather difficult to achieve in practice. Suggestion B: Formulate the scheme to have distinguishable decryption failures, then prove security under this formalism. Thereby making security less implementation-dependent. Syntactically the resulting scheme is different, and requires revisiting some of the established relations for AE.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 19/22

slide-43
SLIDE 43

Ciphertext Fragmentation Distinguishable Decryption Failures

Possible Remedies

Suggestion A: Ensure at the implementation stage that distinct decryption failures are indistinguishable. History shows that this is rather difficult to achieve in practice. Suggestion B: Formulate the scheme to have distinguishable decryption failures, then prove security under this formalism. Thereby making security less implementation-dependent. Syntactically the resulting scheme is different, and requires revisiting some of the established relations for AE.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 19/22

slide-44
SLIDE 44

Ciphertext Fragmentation Distinguishable Decryption Failures

Possible Remedies

Suggestion A: Ensure at the implementation stage that distinct decryption failures are indistinguishable. History shows that this is rather difficult to achieve in practice. Suggestion B: Formulate the scheme to have distinguishable decryption failures, then prove security under this formalism. Thereby making security less implementation-dependent. Syntactically the resulting scheme is different, and requires revisiting some of the established relations for AE.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 19/22

slide-45
SLIDE 45

Ciphertext Fragmentation Distinguishable Decryption Failures

Revisiting the Basics

Bellare and Namprempre introduced the following simple but useful relations: IND-CPA ∧ INT-CTXT ⇒ IND-CCA INT-CTXT ⇒ INT-PTXT. Since then INT-CTXT and IND-CPA have become the commonly accepted security benchmark for AE. Rogaway and Shrimpton later elegantly combined these two notions into a single one, sometimes referred to as IND-CCA3.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 20/22

slide-46
SLIDE 46

Ciphertext Fragmentation Distinguishable Decryption Failures

Revisiting the Basics

Bellare and Namprempre introduced the following simple but useful relations: IND-CPA ∧ INT-CTXT ⇒ IND-CCA INT-CTXT ⇒ INT-PTXT. Since then INT-CTXT and IND-CPA have become the commonly accepted security benchmark for AE. Rogaway and Shrimpton later elegantly combined these two notions into a single one, sometimes referred to as IND-CCA3.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 20/22

slide-47
SLIDE 47

Ciphertext Fragmentation Distinguishable Decryption Failures

Revisiting the Basics

For schemes with multiple errors there exists the following separation: IND-CPA ∧ INT-CTXT ⇒ IND-CCA. Hence IND-CPA and INT-CTXT no longer guarantee strong confidentiality, and are not suited as the target security notion for multiple-error AE schemes. In ongoing work we extend these security notions to the multiple error case (non-trivial), and we establish similar relations in order to guarantee IND-CCA security and INT-PTXT.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 21/22

slide-48
SLIDE 48

Ciphertext Fragmentation Distinguishable Decryption Failures

Revisiting the Basics

For schemes with multiple errors there exists the following separation: IND-CPA ∧ INT-CTXT ⇒ IND-CCA. Hence IND-CPA and INT-CTXT no longer guarantee strong confidentiality, and are not suited as the target security notion for multiple-error AE schemes. In ongoing work we extend these security notions to the multiple error case (non-trivial), and we establish similar relations in order to guarantee IND-CCA security and INT-PTXT.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 21/22

slide-49
SLIDE 49

Ciphertext Fragmentation Distinguishable Decryption Failures

Design Criteria II

Distinguishable Decryption Failures

A good AE scheme should have implementation-robust security; in the sense that security should be preserved in most ‘reasonable’ practical realisations of the scheme. To guard against distinguishable decryption failures, each test condition in the decryption algorithm that determines ciphertext validity should return a unique error symbol. Chosen-ciphertext security should then be proved for the resulting multiple-error scheme. Alternatively the approach could be applied to a scheme’s implementation to verify that it remains secure.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 22/22