forking a blockcipher for authenticated encryption of very ...ask2018/slides/damian-vizar.pdf ·...

78
Forking a Blockcipher for Authenticated Encryption of Very Short Messages Damian Vizár (CSEM, Switzerland) ASK 2018, Kolkata Joint work with: Elena Andreeva (KU Leuven, Belgium) Reza Reyhanitabar (Elektrobit, Germany) Kerem Varici (KU Leuven, Belgium)

Upload: others

Post on 13-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Forking a Blockcipher for Authenticated Encryption of Very Short Messages

Damian Vizár (CSEM, Switzerland)

ASK 2018, Kolkata

Joint work with:

Elena Andreeva (KU Leuven, Belgium)

Reza Reyhanitabar (Elektrobit, Germany)

Kerem Varici (KU Leuven, Belgium)

Page 2: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption

1

Page 3: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption

• Confidentiality and Integrity

1

Page 4: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption

• Confidentiality and Integrity

1

Page 5: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption

• Confidentiality and Integrity

1

Page 6: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption

• Confidentiality and Integrity

• Standalone primitive [Bellare, Rogaway 00], [Katz, Yung 00]

o OCB [BBKR 01], CCM [HWF 03], GCM [McGrew, Viega 04]

1

Page 7: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption

• Confidentiality and Integrity

• Standalone primitive [Bellare, Rogaway 00], [Katz, Yung 00]

o OCB [BBKR 01], CCM [HWF 03], GCM [McGrew, Viega 04]

• Useful and widely used

1

Page 8: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption

• Confidentiality and Integrity

• Standalone primitive [Bellare, Rogaway 00], [Katz, Yung 00]

o OCB [BBKR 01], CCM [HWF 03], GCM [McGrew, Viega 04]

• Useful and widely used

• BUT issues with performance, robustness, patent burden …

1

Page 9: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption: is it solved?

CAESAR competition:

• Boost research, find new AEAD schemes

o 57 submissions

o 3 5 years of activity

2

Page 10: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption: is it solved?

CAESAR competition:

• Boost research, find new AEAD schemes

o 57 submissions

o 3 5 years of activity

• A LOT of results

o Primitives, constructions, security notions

2

Page 11: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption: is it solved?

CAESAR competition:

• Boost research, find new AEAD schemes

o 57 submissions

o 3 5 years of activity

• A LOT of results

o Primitives, constructions, security notions

• AE schemes for different use cases

o High speed Robustness Lightweight

2

Page 12: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption: is it solved?

CAESAR competition:

• Boost research, find new AEAD schemes

o 57 submissions

o 3 5 years of activity

• A LOT of results

o Primitives, constructions, security notions

• AE schemes for different use cases

o High speed Robustness Lightweight

• 7 schemes in final portfolio

2

Page 13: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Authenticated Encryption: is it solved?

CAESAR competition:

• Boost research, find new AEAD schemes

o 57 submissions

o 3 5 years of activity

• A LOT of results

o Primitives, constructions, security notions

• AE schemes for different use cases

o High speed Robustness Lightweight

• 7 schemes in final portfolio

2

Page 14: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

New Challenges

• “IoT” devices

3

Page 15: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

New Challenges

• “IoT” devices

• Distinct constraints

o Latency, throughput, power, code size/area, …

3

Page 16: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

New Challenges

• “IoT” devices

• Distinct constraints

o Latency, throughput, power, code size/area, …

3

Page 17: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

New Challenges

• “IoT” devices

• Distinct constraints

o Latency, throughput, power, code size/area, …

3

Page 18: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

New Challenges

• “IoT” devices

• Distinct constraints

o Latency, throughput, power, code size/area, …

3

Page 19: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

New Challenges

• “IoT” devices

• Distinct constraints

o Latency, throughput, power, code size/area, …

3

Page 20: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

New Challenges

• “IoT” devices

• Distinct constraints

o Latency, throughput, power, code size/area, …

• New communication patterns

o Dominated by (very) short messages

3

M

Page 21: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

(Very) Short Messages: Possibly <= 1 AES Block

• Short data burst [5G spec]

o “Small status updates (few bits)”

IoT Setting

4

Page 22: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

(Very) Short Messages: Possibly <= 1 AES Block

• Short data burst [5G spec]

o “Small status updates (few bits)”

• Low-latency processing short messages [SecOC (automotive)]

o Payload <= 64 bytes [CAN FD standard (ISO 11898-1)]

IoT Setting

4

Page 23: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

(Very) Short Messages: Possibly <= 1 AES Block

• Short data burst [5G spec]

o “Small status updates (few bits)”

• Low-latency processing short messages [SecOC (automotive)]

o Payload <= 64 bytes [CAN FD standard (ISO 11898-1)]

• Constrained channels [NB-IoT]

o 16 bits <= transport block size <= 680 bits/1000bits

IoT Setting

4

Page 24: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

(Very) Short Messages: Possibly <= 1 AES Block

• Short data burst [5G spec]

o “Small status updates (few bits)”

• Low-latency processing short messages [SecOC (automotive)]

o Payload <= 64 bytes [CAN FD standard (ISO 11898-1)]

• Constrained channels [NB-IoT]

o 16 bits <= transport block size <= 680 bits/1000bits

• NIST’s call for lightweight crypto

o “Be efficient for short messages (e.g., as short as 8 bytes)”

IoT Setting

4

Page 25: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

(Very) Short Messages: Possibly <= 1 AES Block

• Short data burst [5G spec]

o “Small status updates (few bits)”

• Low-latency processing short messages [SecOC (automotive)]

o Payload <= 64 bytes [CAN FD standard (ISO 11898-1)]

• Constrained channels [NB-IoT]

o 16 bits <= transport block size <= 680 bits/1000bits

• NIST’s call for lightweight crypto

o “Be efficient for short messages (e.g., as short as 8 bytes)”

IoT Setting

4

Page 26: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Existing AES-based AE vs Very Short Messages

5

Page 27: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Existing AES-based AE vs Very Short Messages

5

a,m: length of A and M in 128-bit blocks; per-session key derivation excluded

Page 28: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Existing AES-based AE vs Very Short Messages

5

a,m: length of A and M in 128-bit blocks; per-session key derivation excluded

GHASH: a + m + 1 GF(2128) mul.

&

CTR mode: m + 1 AES calls

extra AES and m+1 mul. for tag

Page 29: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Existing AES-based AE vs Very Short Messages

5

a,m: length of A and M in 128-bit blocks; per-session key derivation excluded

CBC MAC: a + m +1 AES calls

&

CTR: m + 1 AES calls

extra AES for tag, m+1 extra calls for MAC

Page 30: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Existing AES-based AE vs Very Short Messages

5

a,m: length of A and M in 128-bit blocks; per-session key derivation excluded

AD-HASH: a AES calls

&

OCB core: m + 2 AES calls

2x extra AES for tag and for derived key

Page 31: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Existing AES-based AE vs Very Short Messages

5

a,m: length of A and M in 128-bit blocks; per-session key derivation excluded

IV + CFB: a + m AES calls

&

Tag: m + 1 AES calls

m+1 extra AES calls for tag

Page 32: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Existing AES-based AE vs Very Short Messages

5

a,m: length of A and M in 128-bit blocks; per-session key derivation excluded

AD-HASH: a Deoxys calls (1.4 AES)

&

OCB core: m + 1 Deoxys calls (1.4 AES)

1.4 extra AES for tag

Page 33: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Existing AES-based AE vs Very Short Messages

5

a,m: length of A and M in 128-bit blocks; per-session key derivation excluded

AD-HASH: a KIASU calls (~ AES)

&

OCB core: m + 1 KIASU calls (~AES)

extra AES for tag

Page 34: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Existing AES-based AE vs Very Short Messages

5

a,m: length of A and M in 128-bit blocks; per-session key derivation excluded

“The performance target is wrong · · · an authenticated cipher is applied to many small messages · · · The challenge here is to minimize overhead.” [ECRYPT-CSA 2017]

Page 35: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Nonce-based Authenticated Encryption with Associated Data

6

• Enc,Dec: deterministic algorithms

• N: Nonce, must not repeat

• A: Associated Data, authenticated, but not encrypted

• M: Plaintext, encrypted and authenticated

• K: Secret key

Also |C| = |M| + τ and Dec(K,N,A,Enc(K,N,A,M)) = M

Page 36: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Nonce-based Authenticated Encryption with Associated Data

6

• Enc,Dec: deterministic algorithms

• N: Nonce, must not repeat

• A: Associated Data, authenticated, but not encrypted

• M: Plaintext, encrypted and authenticated

• K: Secret key

Also |C| = |M| + τ and Dec(K,N,A,Enc(K,N,A,M)) = M

Page 37: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Nonce-based Authenticated Encryption with Associated Data

6

• Enc,Dec: deterministic algorithms

• N: Nonce, must not repeat

• A: Associated Data, authenticated, but not encrypted

• M: Plaintext, encrypted and authenticated

• K: Secret key

Also |C| = |M| + τ and Dec(K,N,A,Enc(K,N,A,M)) = M

Page 38: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Nonce-based Authenticated Encryption with Associated Data

6

• Enc,Dec: deterministic algorithms

• N: Nonce, must not repeat

• A: Associated Data, authenticated, but not encrypted

• M: Plaintext, encrypted and authenticated

• K: Secret key

Also |C| = |M| + τ and Dec(K,N,A,Enc(K,N,A,M)) = M

Page 39: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

The Notional Gap

7

Available primitives:

Page 40: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

The Notional Gap

7

secret randompermutation

public randompermutation

random function (compressing)

Available primitives:

Page 41: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

The Notional Gap

• No integrity or non-trivial redundancy

7

secret randompermutation

public randompermutation

random function (compressing)

Available primitives:

Page 42: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

The Notional Gap

• No integrity or non-trivial redundancy

• For AE: at least 1 extra call for integrity

o Amortized in long queries

o 100% overhead for short queries!

7

secret randompermutation

public randompermutation

random function (compressing)

Available primitives:

Page 43: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

The Notional Gap

• No integrity or non-trivial redundancy

• For AE: at least 1 extra call for integrity

o Amortized in long queries

o 100% overhead for short queries!

7

secret randompermutation

public randompermutation

random function (compressing)

Available primitives:

Solution:

Invent a new primitive

Page 44: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher

9

• Keyed

• Expanding

• Tweakable

• Invertible

• Parallel permutations

Page 45: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher: Syntax

10

• Forward: n-bit block 2 n-bit blocks

Page 46: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher: Syntax

10

• Forward: n-bit block 2 n-bit blocks

• Inverse: n-bit block, binary flag n-bit block

o Can invert either output block

Page 47: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher: Syntax

10

• Forward: n-bit block 2 n-bit blocks

• Inverse: n-bit block, binary flag n-bit block

o Can invert either output block

• Reconstruction: n-bit block, binary flag n-bit block

o Can reconstruct either ouput block from the other output block

Page 48: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher: Security

11

Page 49: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher: Security

• Almost AE security (natural PRI construction)

11

Page 50: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher: Security

• Almost AE security (natural PRI construction)

• “Two TBCs? What’s so novel about that?”

11

Page 51: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher Instantiation: Iterate-Fork-Iterate

• IFI: Round Function + Tweakey Schedule + #rounds/3

12

Page 52: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher Instantiation: Iterate-Fork-Iterate

• IFI: Round Function + Tweakey Schedule + #rounds/3

• No pathological structural weakness (3 tweakable rand. perm. => perfectly secure)

12

Page 53: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

ForkAES = IFI[KIASU,r=5]

• RF and KS from AES, 64 bit tweak

12

Page 54: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

ForkAES = IFI[KIASU,r=5]

• RF and KS from AES, 64 bit tweak

• Provocative prototype: Aggressively optimized for efficiency

12

Page 55: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

ForkAES: Security

• Mostly inherited from AES/KIASU

o Differential/Linear propagation as in AES

o Related tweakey properties as in KIASU

13

Page 56: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

ForkAES: Security

• Mostly inherited from AES/KIASU

o Differential/Linear propagation as in AES

o Related tweakey properties as in KIASU

• New attack vector in the fork?

13

Page 57: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

ForkAES: Security

• Mostly inherited from AES/KIASU

o Differential/Linear propagation as in AES

o Related tweakey properties as in KIASU

• New attack vector in the fork?

• Seems so [Bossert, List, Lucks 18]

o Related tweakey rectangle on 9 rounds

o Related tweaky imposs. diff. on 9 rounds

o Sec margin: - 1 rnd compared to KIASU

13

Page 58: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

ForkAES: Security

• Mostly inherited from AES/KIASU

o Differential/Linear propagation as in AES

o Related tweakey properties as in KIASU

• New attack vector in the fork?

• Seems so [Bossert, List, Lucks 18]

o Related tweakey rectangle on 9 rounds

o Related tweaky imposs. diff. on 9 rounds

o Sec margin: - 1 rnd compared to KIASU

• Need more cryptanalysis and constructive results

13

Page 59: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher Modes for Short-Input AE

• Design target: Nonce-based AEAD

• Goal:

14

Page 60: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher Modes for Short-Input AE

• Design target: Nonce-based AEAD

• Goal:

• A single F-call for shortest messages

14

Page 61: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher Modes for Short-Input AE

• Design target: Nonce-based AEAD

• Goal:

• A single F-call for shortest messages

• Parallelizable AE, Serial AE, a GCM variant

14

Page 62: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

• Single F-call per block of data => single F call for short queries

• Ciphertext expansion: n bits

• Fully parallelizable

PAEF

Parallelizable AE from Forkcipher

15

Page 63: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

• Single F-call per block of data => single F call for short queries

• Ciphertext expansion: n bits

• Fully parallelizable

PAEF

Parallelizable AE from Forkcipher

T = flag || Nonce || counter

15

Page 64: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

• Single F-call per block of data => single F call for short queries

• Ciphertext expansion: n bits

• Fully parallelizable

PAEF

Parallelizable AE from Forkcipher

Branch not evaluated

15

Page 65: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

• Single F-call per block of data => single F call for short queries

• Ciphertext expansion: n bits

• Fully parallelizable

PAEF

Parallelizable AE from Forkcipher

15

Page 66: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

PAEF

Parallelizable AE from Forkcipher

15

Page 67: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

SAEF

• Single F-call per block of data => single F call for short queries

• Ciphertext expansion: n bits

• No need to maintain a counter

Serial AE from Forkcipher

16

Page 68: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

SAEF

• Single F-call per block of data => single F call for short queries

• Ciphertext expansion: n bits

• No need to maintain a counter

Serial AE from Forkcipher

T = flag||nonce

16

Page 69: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

SAEF

• Single F-call per block of data => single F call for short queries

• Ciphertext expansion: n bits

• No need to maintain a counter

Serial AE from Forkcipher

16

Page 70: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

SAEF

• Single F-call per block of data => single F call for short queries

• Ciphertext expansion: n bits

• No need to maintain a counter

Serial AE from Forkcipher

16

Page 71: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

fGCM

• F-call per 2 blocks of M, last block = 1 F-call

• Ciphertext expansion: n bits

• Strictly more efficient than GCM

Forkcipher-based GCM

17

Page 72: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

fGCM

• F-call per 2 blocks of M, last block = 1 F-call

• Ciphertext expansion: n bits

• Strictly more efficient than GCM

Forkcipher-based GCM

T = flag || nonce

17

Page 73: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

fGCM

• F-call per 2 blocks of M, last block = 1 F-call

• Ciphertext expansion: n bits

• Strictly more efficient than GCM

Forkcipher-based GCM

17

Page 74: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Forkcipher Modes vs Very Short Messages

a,m: length of A and M in 128-bit blocks; per-session key derivation excluded

18

Page 75: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Conclusion

• Forkcipher

o Expanding, almost AE-security

o Aspiration: as 2 TBCs at lower cost

o Aggressive prototype: ForkAES @ 1.5 AES-128

19

Page 76: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Conclusion

• Forkcipher

o Expanding, almost AE-security

o Aspiration: as 2 TBCs at lower cost

o Aggressive prototype: ForkAES @ 1.5 AES-128

• Forkcipher modes:

o Faster than all AES-based modular designs for very short messages

19

Page 77: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Copyright 2018 CSEM | Forking a Blockcipher for AE of Very Short Messages | D. Vizár | Page

Conclusion

• Forkcipher

o Expanding, almost AE-security

o Aspiration: as 2 TBCs at lower cost

o Aggressive prototype: ForkAES @ 1.5 AES-128

• Forkcipher modes:

o Faster than all AES-based modular designs for very short messages

• Open problems:

o Cryptanalysis of IFI, new instances

o Modes: same efficiency, tunable expansion

o Other applications of forkcipher (e.g., stream in fGCM)

o Forkcipher ≠ PRI (Bday gap); a tweakable FIL PRI primitive?

19

Page 78: Forking a Blockcipher for Authenticated Encryption of Very ...ask2018/slides/damian-vizar.pdf · •Constrained channels [NB-IoT] o 16 bits

Thank you for your attention!

Follow us on

www.csem.ch