Advancing in Authenticated Encryption
Advancing in Authenticated Encryption
Disciplines
Computer Sciences (100%)
Keywords
-
Cryptanalysis,
Authenticated Encryption,
Symmertic Cryptography
Today, we stand at a point, where countless devices are communicating over publicly accessible networks. One basic need that occurs in such a scenario is the need that messages exchanged between two communicating parties (usually named Alice and Bob) are kept confidential and authentic. In this context, confidentiality means that no one except Alice and Bob should be able to read the message and authenticity means that an alteration of the sent message maliciously, or unintentionally can be detected. Both goals can be achieved by using authenticated encryption (AE). AE fulfills a crucial need because for most applications that we use every day there is not much value in just ensuring that a message is kept confidential. This includes applications with a sole private purpose like instant messaging, but also commercial applications like e-commerce, or online banking. Due to its practical importance, AE is a very active research topic, having a steady stream of new ideas and new designs. So the big question is, which out of the many proposed designs is secure? At the moment, the answer to this question is cryptanalysis. During cryptanalysis, researchers try to find ways to attack the scheme itself, but also weakened versions of it. In this way, the insight into the security of the designs grows over the years. This leaves us with another question, which of the secure designs should be used in practice? In symmetric cryptography, one useful answer is public and open cryptographic competitions. Here, researchers from all over the world submit their best designs and scrutinize the other submissions. Examples of such competitions are the ongoing CAESAR competition and the NIST lightweight call, both searching for AE schemes. In this project, we want to provide advancements to the state-of-the-art in AE. We do this by further scrutinizing the security of the AE scheme Ascon. Ascon, which we co-designed, is one of the seven (out of 57) finalists of CAESAR. Furthermore, the research in the security of Ascon should lead to a submission to the NIST lightweight call. Also, we plan to analyze other design ideas, like parallel permutation-based cryptography or schemes that are resilient against certain classes of side-channel attacks. Analysis of such schemes allows for a better quantification of their strengths and weaknesses, which in turn leads to a better understanding on the design of AE schemes that can potentially be used in further refinements of existing schemes, or even new designs. The fellowship will fund the work of Christoph Dobraunig, which will be mainly conducted at the Radboud University (the Netherlands). There, Christoph will work together with Joan Daemen, a co- designer of AES and SHA-3.
Today, we stand at a point where countless devices are communicating over publicly accessible networks. One basic need that occurs in such a scenario is that messages exchanged between two communicating parties (usually named Alice and Bob) are kept confidential and authentic. In this context, confidentiality means that no one except Alice and Bob can read the message, and authenticity means that an alteration of the sent message - maliciously or unintentionally - can be detected. Both goals can be achieved by using authenticated encryption (AE). AE fulfills a crucial need because, for most applications that we use every day, there is not much value in just ensuring that a message is kept confidential. This includes applications with a sole private purpose like instant messaging and commercial applications like e-commerce or online banking. However, the question is, how do we ensure that the AE-schemes we use are useful and secure? In symmetric cryptography, one answer is a public and open cryptographic competition. Here, researchers from all over the world submit their best designs and scrutinize the other submissions. This project enabled us to contribute to three submissions for the ongoing lightweight cryptography standardization process organized by NIST. At the time of writing (October 2020), all three submissions, Ascon, Elephant, and Isap v2.0, are still participating in the process's second round. From the first to the second round, the initial 56 candidates have been reduced down to 32. In addition, the research conducted in this project aided the standardization process by publishing cryptanalysis of third-party schemes. Naturally, these results do not only help the lightweight cryptography standardization process but also help to grow the insight into the security of AE-designs. However, for many use-cases of AE, cryptanalytic security is not enough. In particular, implementations of AE often have to withstand side-channel attacks (e.g., attacks that aim to extract the secret key from a device using its power consumption) and fault attacks (attacks that induce faults during the computation). In this project, we researched and published implementation-level countermeasures against such side-channel and fault attacks. In particular, those countermeasures are able to provide protection against a new category of fault attacks called statistical ineffective fault attacks and are applicable to a wide-range of AE-schemes. Considering that the AE-scheme Isap v2.0 has been designed to provide increased resilience against certain classes of side-channel attacks, we investigated the leakage resilience of the duplex and the suffix keyed sponge construction. These results are applicable but not limited to Isap v2.0.
- Radboud University Nijmegen - 100%
- Technische Universität Graz - 100%
Research Output
- 306 Citations
- 19 Publications
-
2022
Title Leakage and Tamper Resilient Permutation-Based Cryptography DOI 10.1145/3548606.3560635 Type Conference Proceeding Abstract Author Dobraunig C Pages 859-873 Link Publication -
2021
Title Ascon v1.2: Lightweight Authenticated Encryption and Hashing DOI 10.1007/s00145-021-09398-9 Type Journal Article Author Dobraunig C Journal Journal of Cryptology Pages 33 Link Publication -
2020
Title Practical forgeries for ORANGE DOI 10.1016/j.ipl.2020.105961 Type Journal Article Author Dobraunig C Journal Information Processing Letters Pages 105961 Link Publication -
2019
Title Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion DOI 10.5281/zenodo.2593577 Type Other Author Ankele R Link Publication -
2019
Title Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion DOI 10.5281/zenodo.2593578 Type Other Author Ankele R Link Publication -
2019
Title Leakage Resilience of the Duplex Construction DOI 10.1007/978-3-030-34618-8_8 Type Book Chapter Author Dobraunig C Publisher Springer Nature Pages 225-255 -
2019
Title Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion DOI 10.46586/tosc.v2019.i1.192-235 Type Journal Article Author Ankele R Journal IACR Transactions on Symmetric Cryptology Pages 192-235 Link Publication -
0
DOI 10.1145/3548606 Type Other -
2022
Title Multi-user Security of the Elephant v2 Authenticated Encryption Mode DOI 10.1007/978-3-030-99277-4_8 Type Book Chapter Author Beyne T Publisher Springer Nature Pages 155-178 -
2019
Title Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion DOI 10.13154/tosc.v2019.i1.192-235 Type Journal Article Author Ankele R Journal IACR Transactions on Symmetric Cryptology Pages 192-235 Link Publication -
2020
Title Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96 DOI 10.13154/tosc.v2020.i1.289-312 Type Other Author Dobraunig C Link Publication -
2020
Title Isap v2.0 DOI 10.13154/tosc.v2020.is1.390-416 Type Other Author Dobraunig C Link Publication -
2020
Title Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus DOI 10.13154/tosc.v2020.is1.5-30 Type Other Author Beyne T Link Publication -
2020
Title Tightness of the Suffix Keyed Sponge Bound DOI 10.46586/tosc.v2020.i4.195-212 Type Journal Article Author Dobraunig C Journal IACR Transactions on Symmetric Cryptology -
2020
Title Security of the Suffix Keyed Sponge DOI 10.13154/tosc.v2019.i4.223-248 Type Other Author Dobraunig C Link Publication -
2020
Title Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus DOI 10.46586/tosc.v2020.is1.5-30 Type Journal Article Author Beyne T Journal IACR Transactions on Symmetric Cryptology Pages 5-30 Link Publication -
2020
Title Security of the Suffix Keyed Sponge DOI 10.46586/tosc.v2019.i4.223-248 Type Journal Article Author Dobraunig C Journal IACR Transactions on Symmetric Cryptology Pages 223-248 Link Publication -
2020
Title Protecting against Statistical Ineffective Fault Attacks DOI 10.46586/tches.v2020.i3.508-543 Type Journal Article Author Daemen J Journal IACR Transactions on Cryptographic Hardware and Embedded Systems Pages 508-543 Link Publication -
2020
Title Protecting against Statistical Ineffective Fault Attacks DOI 10.13154/tches.v2020.i3.508-543 Type Journal Article Author Daemen J Journal IACR Transactions on Cryptographic Hardware and Embedded Systems Pages 508-543 Link Publication