SLIDE 1 The impact of security proofs: two troublesome case studies
University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published.
SLIDE 2 The impact of security proofs: two troublesome case studies
University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof.
SLIDE 3 The impact of security proofs: two troublesome case studies
University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2.
SLIDE 4 The impact of security proofs: two troublesome case studies
University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2. 2014 Wikip is used in (MACsec) 802.11ad ANSI (INCITS) Security P1619.1 standards, AES-GCM NSA Suite ✿ ✿ ✿
SLIDE 5 The impact of security proofs: two troublesome case studies
University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2. 2014 Wikipedia: “GCM is used in the IEEE (MACsec) Ethernet 802.11ad (also kno ANSI (INCITS) Fib Security Protocols P1619.1 tape storage, standards, SSH and AES-GCM is included NSA Suite B Cryptography ✿ ✿ ✿
SLIDE 6 The impact of security proofs: two troublesome case studies
University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2. 2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), P1619.1 tape storage, IETF standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿
SLIDE 7 The impact of security proofs: two troublesome case studies
University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2. 2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿
SLIDE 8 The impact of security proofs: two troublesome case studies
University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2. 2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ GCM has been proven secure in the concrete security model.”
SLIDE 9 The impact of security proofs: two troublesome case studies
University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2. 2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ GCM has been proven secure in the concrete security model.” XCB also widely used? Maybe.
SLIDE 10
impact of security proofs: troublesome case studies Bernstein University of Illinois at Chicago & echnische Universiteit Eindhoven GCM is published security proof. XCBv1 is published. NIST standardizes GCM. XCBv2 is published security proof. IEEE standardizes XCBv2. 2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ GCM has been proven secure in the concrete security model.” XCB also widely used? Maybe. 2012 Iwata–Oha Original New attack main part New pro
SLIDE 11 security proofs: case studies Illinois at Chicago & Universiteit Eindhoven published
published. standardizes GCM. published
standardizes XCBv2. 2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ GCM has been proven secure in the concrete security model.” XCB also widely used? Maybe. 2012 Iwata–Ohashi–Minem Original GCM proof New attack “invalidates main part of the p New proof, lower
SLIDE 12
studies Chicago & Eindhoven published. GCM. CBv2. 2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ GCM has been proven secure in the concrete security model.” XCB also widely used? Maybe. 2012 Iwata–Ohashi–Minema Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof New proof, lower security level
SLIDE 13
2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ GCM has been proven secure in the concrete security model.” XCB also widely used? Maybe. 2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level.
SLIDE 14
2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ GCM has been proven secure in the concrete security model.” XCB also widely used? Maybe. 2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level. 2013 Chakraborty–Hernandez- Jimenez–Sarkar: Original XCBv2 proof was wrong. New proof for some message lengths, but the “resulting bound that can be proved is much worse than what has been claimed by the authors.”
SLIDE 15
2014 Wikipedia: “GCM mode is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE 802.11ad (also known as WiGig), ANSI (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ GCM has been proven secure in the concrete security model.” XCB also widely used? Maybe. 2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level. 2013 Chakraborty–Hernandez- Jimenez–Sarkar: Original XCBv2 proof was wrong. New proof for some message lengths, but the “resulting bound that can be proved is much worse than what has been claimed by the authors.” New efficient attack on XCBv2 for other message lengths.
SLIDE 16
Wikipedia: “GCM mode in the IEEE 802.1AE Csec) Ethernet security, IEEE 802.11ad (also known as WiGig), (INCITS) Fibre Channel Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec rds, SSH and TLS 1.2. AES-GCM is included into the Suite B Cryptography. ✿ ✿ ✿ has been proven secure in concrete security model.” also widely used? Maybe. 2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level. 2013 Chakraborty–Hernandez- Jimenez–Sarkar: Original XCBv2 proof was wrong. New proof for some message lengths, but the “resulting bound that can be proved is much worse than what has been claimed by the authors.” New efficient attack on XCBv2 for other message lengths. What do Modern is fragile Do we have to eliminate
SLIDE 17 “GCM mode IEEE 802.1AE Ethernet security, IEEE known as WiGig), Fibre Channel cols (FC-SP), IEEE storage, IETF IPsec and TLS 1.2. included into the
proven secure in security model.” used? Maybe. 2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level. 2013 Chakraborty–Hernandez- Jimenez–Sarkar: Original XCBv2 proof was wrong. New proof for some message lengths, but the “resulting bound that can be proved is much worse than what has been claimed by the authors.” New efficient attack on XCBv2 for other message lengths. What does this mean? Modern “provable is fragile and untrust Do we have a strat to eliminate these
SLIDE 18 mode 802.1AE security, IEEE WiGig), Channel C-SP), IEEE IETF IPsec 1.2. the
secure in model.” Maybe. 2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level. 2013 Chakraborty–Hernandez- Jimenez–Sarkar: Original XCBv2 proof was wrong. New proof for some message lengths, but the “resulting bound that can be proved is much worse than what has been claimed by the authors.” New efficient attack on XCBv2 for other message lengths. What does this mean? Modern “provable security” is fragile and untrustworthy. Do we have a strategy to eliminate these failures?
SLIDE 19
2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level. 2013 Chakraborty–Hernandez- Jimenez–Sarkar: Original XCBv2 proof was wrong. New proof for some message lengths, but the “resulting bound that can be proved is much worse than what has been claimed by the authors.” New efficient attack on XCBv2 for other message lengths. What does this mean? Modern “provable security” is fragile and untrustworthy. Do we have a strategy to eliminate these failures?
SLIDE 20
2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level. 2013 Chakraborty–Hernandez- Jimenez–Sarkar: Original XCBv2 proof was wrong. New proof for some message lengths, but the “resulting bound that can be proved is much worse than what has been claimed by the authors.” New efficient attack on XCBv2 for other message lengths. What does this mean? Modern “provable security” is fragile and untrustworthy. Do we have a strategy to eliminate these failures? Do security proofs actually reduce risk compared to thorough cryptanalysis?
SLIDE 21
2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level. 2013 Chakraborty–Hernandez- Jimenez–Sarkar: Original XCBv2 proof was wrong. New proof for some message lengths, but the “resulting bound that can be proved is much worse than what has been claimed by the authors.” New efficient attack on XCBv2 for other message lengths. What does this mean? Modern “provable security” is fragile and untrustworthy. Do we have a strategy to eliminate these failures? Do security proofs actually reduce risk compared to thorough cryptanalysis? Did the security proofs encourage standardization without thorough cryptanalysis?
SLIDE 22
2012 Iwata–Ohashi–Minematsu: Original GCM proof was wrong. New attack “invalidates the main part of the privacy proof”. New proof, lower security level. 2013 Chakraborty–Hernandez- Jimenez–Sarkar: Original XCBv2 proof was wrong. New proof for some message lengths, but the “resulting bound that can be proved is much worse than what has been claimed by the authors.” New efficient attack on XCBv2 for other message lengths. What does this mean? Modern “provable security” is fragile and untrustworthy. Do we have a strategy to eliminate these failures? Do security proofs actually reduce risk compared to thorough cryptanalysis? Did the security proofs encourage standardization without thorough cryptanalysis? Did the security proofs deter cryptanalysis?