scispace - formally typeset
Book ChapterDOI

Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption

Bart Mennink
- Vol. 2020, pp 630-661
TLDR
In this paper, the authors presented generalized solutions to parallel block cipher rekeying that, for the first time, achieve security beyond the birthday bound in the block size n, which is an efficient way to achieve side-channel protection.
Abstract
Fresh rekeying is a well-established method to protect a primitive or mode against side-channel attacks: an easy to protect but cryptographically not so involved function generates a subkey from the master key, and this subkey is then used for the block encryption of a single or a few messages. It is an efficient way to achieve side-channel protection, but current solutions only achieve birthday bound security in the block size of the cipher and thus halve its security (except if more involved primitives are employed). We present generalized solutions to parallel block cipher rekeying that, for the first time, achieve security beyond the birthday bound in the block size n. The first solution involves, next to the subkey generation, one multiplication and the core block cipher call and achieves \(2^{2n/3}\) security. The second solution makes two block cipher calls, and achieves optimal \(2^n\) security. Our third solution uses a slightly larger subkey generation function but requires no adaptations to the core encryption and also achieves optimal security. The construction seamlessly generalizes to permutation based fresh rekeying. Central to our schemes is the observation that fresh rekeying and generic tweakable block cipher design are two very related topics, and we can take lessons from the advanced results in the latter to improve our understanding and development of the former. We subsequently use these rekeying schemes in a constructive manner to deliver three authenticated encryption modes that achieve beyond birthday bound security and are easy to protect against side-channel attacks.

read more

Citations
More filters
Book ChapterDOI

Delayed authentication: Preventing replay and relay attacks in private contact tracing

TL;DR: A simple non-interactive variant of the basic protocol that provably prevents replay and relay attacks, and introduces the concept of “delayed authentication”, which basically is a message authentication code where verification can be done in two steps, where the first doesn’t require the key, and the second doesn�’ts require the message.
Posted Content

Digital Surveillance Systems for Tracing COVID-19: Privacy and Security Challenges with Recommendations

TL;DR: The recently designed and developed digital surveillance system applications with their protocols deployed in several countries around the world and their privacy and security challenges are discussed as well as analyzed from the viewpoint of privacy acts.
Journal ArticleDOI

Authenticated Encryption Schemes: A Systematic Review

TL;DR: This study proposes a framework for classifying AE schemes and highlights past contributions to help researchers familiarize themselves with the current state and directions for future research in the area.
Journal ArticleDOI

Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding: Towards Secure and Efficient Fresh Re-Keying

TL;DR: This paper conjecture that by mixing some matrix multiplications in a prime field with a physical mapping similar to the leakage functions exploited in side-channel analysis, the authors can build efficient re-keying schemes based on “crypto-physical dark matter”, that remain secure against an adversary who can access noise-free measurements.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book

The Design of Rijndael: AES - The Advanced Encryption Standard

TL;DR: The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.
Book ChapterDOI

PRESENT: An Ultra-Lightweight Block Cipher

TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.
Related Papers (5)