Book ChapterDOI
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
Bart Mennink
- Vol. 2020, pp 630-661
TLDR
In this paper, the authors presented generalized solutions to parallel block cipher rekeying that, for the first time, achieve security beyond the birthday bound in the block size n, which is an efficient way to achieve side-channel protection.Abstract:
Fresh rekeying is a well-established method to protect a primitive or mode against side-channel attacks: an easy to protect but cryptographically not so involved function generates a subkey from the master key, and this subkey is then used for the block encryption of a single or a few messages. It is an efficient way to achieve side-channel protection, but current solutions only achieve birthday bound security in the block size of the cipher and thus halve its security (except if more involved primitives are employed). We present generalized solutions to parallel block cipher rekeying that, for the first time, achieve security beyond the birthday bound in the block size n. The first solution involves, next to the subkey generation, one multiplication and the core block cipher call and achieves \(2^{2n/3}\) security. The second solution makes two block cipher calls, and achieves optimal \(2^n\) security. Our third solution uses a slightly larger subkey generation function but requires no adaptations to the core encryption and also achieves optimal security. The construction seamlessly generalizes to permutation based fresh rekeying. Central to our schemes is the observation that fresh rekeying and generic tweakable block cipher design are two very related topics, and we can take lessons from the advanced results in the latter to improve our understanding and development of the former. We subsequently use these rekeying schemes in a constructive manner to deliver three authenticated encryption modes that achieve beyond birthday bound security and are easy to protect against side-channel attacks.read more
Citations
More filters
Book ChapterDOI
Delayed authentication: Preventing replay and relay attacks in private contact tracing
TL;DR: A simple non-interactive variant of the basic protocol that provably prevents replay and relay attacks, and introduces the concept of “delayed authentication”, which basically is a message authentication code where verification can be done in two steps, where the first doesn’t require the key, and the second doesn�’ts require the message.
Posted Content
Digital Surveillance Systems for Tracing COVID-19: Privacy and Security Challenges with Recommendations
Molla Rashied Hussein,Abdullah Bin Shams,Ehsanul Hoque Apu,Khondaker Abdullah Al Mamun,Mohammad Shahriar Rahman +4 more
TL;DR: The recently designed and developed digital surveillance system applications with their protocols deployed in several countries around the world and their privacy and security challenges are discussed as well as analyzed from the viewpoint of privacy acts.
Journal ArticleDOI
Authenticated Encryption Schemes: A Systematic Review
Mohamud Ahmed Jimale,Muhammad Reza Z'aba,Miss Laiha Mat Kiah,Mohd Yamani Idna Idris,Norziana Jamil,Moesfa Soeheila Mohamad,Mohd Saufy Rohmad +6 more
TL;DR: This study proposes a framework for classifying AE schemes and highlights past contributions to help researchers familiarize themselves with the current state and directions for future research in the area.
Journal ArticleDOI
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding: Towards Secure and Efficient Fresh Re-Keying
TL;DR: This paper conjecture that by mixing some matrix multiplications in a prime field with a physical mapping similar to the leakage functions exploited in side-channel analysis, the authors can build efficient re-keying schemes based on “crypto-physical dark matter”, that remain secure against an adversary who can access noise-free measurements.
Proceedings ArticleDOI
Hashomer – Privacy-Preserving Bluetooth Based Contact Tracing Scheme for Hamagen
Benny Pinkas,Eyal Ronen +1 more
References
More filters
Book ChapterDOI
Differential Power Analysis
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book
The Design of Rijndael: AES - The Advanced Encryption Standard
Joan Daemen,Vincent Rijmen +1 more
TL;DR: The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.
Book ChapterDOI
PRESENT: An Ultra-Lightweight Block Cipher
Andrey Bogdanov,Lars R. Knudsen,Gregor Leander,Christof Paar,Axel Poschmann,Matthew Robshaw,Yannick Seurin,C. Vikkelsoe +7 more
TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.