pipelineable on-line encryption with tag (poet)2014.diac.cr.yp.to/slides/forler-poet.pdf ·...

62
Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed 2 Scott Fluhrer 1 John Foley 1 Christian Forler 2 Eik List 2 Stefan Lucks 2 David McGrew 1 Jakob Wenzel 2 1 Cisco Systems, 2 Bauhaus-Universität Weimar DIAC 2014 Santa Barbara, CA Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 1

Upload: others

Post on 13-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Pipelineable On-Line Encryption with Tag (POET)

Farzaneh Abed2 Scott Fluhrer1 John Foley1

Christian Forler2 Eik List2 Stefan Lucks2 David McGrew1

Jakob Wenzel2

1 Cisco Systems, 2 Bauhaus-Universität Weimar

DIAC 2014

Santa Barbara, CA

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 1

Page 2: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Outline

1 Motivation

Case Study: OTN

Decryption Misuse

2 CAESAR Submission POET

3 Security of POET

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 2

Page 3: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation

Section 1

Motivation

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 3

Page 4: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Case Study: OTN

Case Study: Optical Transport Network (OTN)

Task:

Secure network traffic . . .

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 4

Page 5: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Case Study: OTN

Case Study: Optical Transport Network (OTN)

Task:

Secure network traffic . . .

. . . of real-time applications . . .

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 4

Page 6: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Case Study: OTN

Case Study: Optical Transport Network (OTN)

Task:

Secure network traffic . . .

. . . of real-time applications . . .

. . . in an Optical Transport Network (OTN)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 4

Page 7: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Case Study: OTN

Case Study: Optical Transport Network (OTN)

Task:

Secure network traffic . . .

. . . of real-time applications . . .

. . . in an Optical Transport Network (OTN)

High throughput (40 - 100 Gbit/s)

Low latency (few clock cycles)

Large message frames (64 KB)

(usually consist of multiple TCP/IP or UDP/IP packages)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 4

Page 8: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Case Study: OTN

Requirements for OTNs

Security requirements:

Data privacy (IND-CPA), and

Data integrity (INT-CTXT)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 5

Page 9: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Case Study: OTN

Requirements for OTNs

Security requirements:

Data privacy (IND-CPA), and

Data integrity (INT-CTXT)

Functional requirements:

On-line encryption/decryption

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 5

Page 10: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Case Study: OTN

Problem and Workarounds

Problem: High Latency of Authenticated Decryption

1 Decryption of the entire message

2 Verification of the authentication tag

For 64-kB frames we have 4,096 ciphertext blocks (128 bits)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 6

Page 11: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Case Study: OTN

Problem and Workarounds

Problem: High Latency of Authenticated Decryption

1 Decryption of the entire message

2 Verification of the authentication tag

For 64-kB frames we have 4,096 ciphertext blocks (128 bits)

Workarounds:

Decrypt-then-mask? [Fouque et al. 03]⇒ latency again

Pass plaintext beforehand and hope. . .

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 6

Page 12: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Case Study: OTN

Problem and Workarounds

Problem: High Latency of Authenticated Decryption

1 Decryption of the entire message

2 Verification of the authentication tag

For 64-kB frames we have 4,096 ciphertext blocks (128 bits)

Workarounds:

Decrypt-then-mask? [Fouque et al. 03]⇒ latency again

Pass plaintext beforehand and hope. . .

Drawbacks:

Plaintext information would leak if authentication tag invalid

Literature calls this setting decryption-misuse

[Fleischmann, Forler, and Lucks 12]

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 6

Page 13: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

How Severe is Decryption-Misuse?

Puts security at high risk

CCA-adversary may inject controlled manipulations

Particularly, CTR-mode based AE schemes

C ⊕∆→Dec M ⊕∆

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 7

Page 14: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

How Severe is Decryption-Misuse?

Puts security at high risk

CCA-adversary may inject controlled manipulations

Particularly, CTR-mode based AE schemes

C ⊕∆→Dec M ⊕∆

Decryption-misuse is not covered by existing CCA3-security proofs

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 7

Page 15: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

Decryption Misuse Resistance

Best to wish for:

Manipulation of ciphertext block Ci

⇒ completely random plaintext

Contradiction to on-line requirement

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 8

Page 16: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

Decryption Misuse Resistance

Best to wish for:

Manipulation of ciphertext block Ci

⇒ completely random plaintext

Contradiction to on-line requirement

What can we achive with an on-line encryption scheme?

Manipulation of Ci ⇒ Mi ,Mi+1, . . . random garbage

Adversary sees at best common message prefixes

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 8

Page 17: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

Decryption Misuse Resistance

Best to wish for:

Manipulation of ciphertext block Ci

⇒ completely random plaintext

Contradiction to on-line requirement

What can we achive with an on-line encryption scheme?

Manipulation of Ci ⇒ Mi ,Mi+1, . . . random garbage

Adversary sees at best common message prefixes

The security notion of OPRP-CCA covers this behaviour

[Bellare et al. 01]

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 8

Page 18: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

On-Line Permutation

P1 P2 P3 P4 P5

P1 P2 P'3 P4 P5

C1 C2

C3 C4 C5

C'3 C'4 C'5

Encrypt

Encrypt

On-Line Pseudo Random Permutation (OPRP)

Like a PRP with the following property:

Plaintexts with common prefix→ ciphertexts with common prefix

(Bellare et al.; “Online Ciphers and the Hash-CBC Construction”; CRYPTO’01)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 9

Page 19: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

OPRP-CCA

Definition (OPRP-CCA Advantage)

Let P be a random on-line permutation, Π = (K ,E ,D) an on-line

encryption scheme, k$← K (), and A be an adversary. Then we

have

AdvOPRP-CCAΠ (A) =

∣Pr

[

AEk (.),Dk (.) =⇒ 1]

−[

AP(.),P−1(.) =⇒ 1]∣

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 10

Page 20: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

Intermediate (Authentication) Tags

Assume an OPRP-CCA secure encryption scheme

Recap: Modifying Ci =⇒ Mi ,Mi+1, . . . ,MM random garbage

Redundancy in the plaintext (e.g., checksum)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 11

Page 21: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

Intermediate (Authentication) Tags

Assume an OPRP-CCA secure encryption scheme

Recap: Modifying Ci =⇒ Mi ,Mi+1, . . . ,MM random garbage

Redundancy in the plaintext (e.g., checksum)

=⇒ intermediate authentication tags

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 11

Page 22: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Motivation Decryption Misuse

Intermediate (Authentication) Tags

Assume an OPRP-CCA secure encryption scheme

Recap: Modifying Ci =⇒ Mi ,Mi+1, . . . ,MM random garbage

Redundancy in the plaintext (e.g., checksum)

=⇒ intermediate authentication tags

Common network packets (TCP/IP, UDP/IP) have a checksum

=⇒ OTN: 16-bit integrity for free (per packet)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 11

Page 23: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Section 2

CAESAR Submission POET

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 12

Page 24: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Pipeline On-Line Encryption (POE)

...E EE

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1

FK1

FK2FK2

FK2

M1 M2 Mb−1

C1 C2 Cb−1

POE is a OPRP-CCA secure enc scheme [Abed et al. 14]

Actually, it provides birthday bound security

POE is used to process a message or ciphertext

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 13

Page 25: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

POET Header Processing

......

E

EE

EE K

KK

K K

H1 H2 Ha−1 Ha Ha||10∗

ττ

L 2L 2a−2L 2a−23L 2a−25L

We just borrowed the PMAC design [Black & Rogaway 02]

Nonce is (part of) the header

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 14

Page 26: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

POET

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

Well pipelineable

1 BC + 2 AXU hash-function (F ) calls per block

Borrows tag-splitting procedure from McOE

Robust against nonce- and decryption-misuse

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 15

Page 27: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Requirements for F

Basic Assumption (F is AXU)

F : {0, 1}k × {0, 1}n → {0, 1}n is ǫ-AXU

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 16

Page 28: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Requirements for F

Basic Assumption (F is AXU)

F : {0, 1}k × {0, 1}n → {0, 1}n is ǫ-AXU

Further Assumption (Cascade F b is AXU)

F bκ (X ) := Fκ(. . . (Fκ(X1)⊕ X2), . . .)⊕ Xb) is b · ǫ-AXU

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 16

Page 29: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Requirements for F

Basic Assumption (F is AXU)

F : {0, 1}k × {0, 1}n → {0, 1}n is ǫ-AXU

Further Assumption (Cascade F b is AXU)

F bκ (X ) := Fκ(. . . (Fκ(X1)⊕ X2), . . .)⊕ Xb) is b · ǫ-AXU

Thanks to Mridul Nandi for pointing out this implicit assumption for

F in our inital version

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 16

Page 30: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Requirements for F

Basic Assumption (F is AXU)

F : {0, 1}k × {0, 1}n → {0, 1}n is ǫ-AXU

Further Assumption (Cascade F b is AXU)

F bκ (X ) := Fκ(. . . (Fκ(X1)⊕ X2), . . .)⊕ Xb) is b · ǫ-AXU

Thanks to Mridul Nandi for pointing out this implicit assumption for

F in our inital version

Nandi will give your more details about this in the next talk :-)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 16

Page 31: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Recommended Instantiations of F

Primary Recommendation: 4-Round-AES

10 + 4 + 4 = 18 AES rounds/block

ǫ-AXU with ǫ ≈ 2−113 [Daemen et al. 09]

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17

Page 32: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Recommended Instantiations of F

Primary Recommendation: 4-Round-AES

10 + 4 + 4 = 18 AES rounds/block

ǫ-AXU with ǫ ≈ 2−113 [Daemen et al. 09]

Secondary Recommendation: 10-Round-AES (Full-AES)

3 · 10 = 30 AES rounds/block

Full AES should be 2−128-AXU

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17

Page 33: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Recommended Instantiations of F

Primary Recommendation: 4-Round-AES

10 + 4 + 4 = 18 AES rounds/block

ǫ-AXU with ǫ ≈ 2−113 [Daemen et al. 09]

Secondary Recommendation: 10-Round-AES (Full-AES)

3 · 10 = 30 AES rounds/block

Full AES should be 2−128-AXU

Withdrawn Recommendation: GF-128 multiplication

Reason: Weak-Key Analysis of POET

Abdelraheem, Bogdanov and Tischhauser applied the

observations of Cid and Procter [CidP13] to POET

https://eprint.iacr.org/2014/226

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17

Page 34: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Software Performance

Software performance with Full-AES [Bogdanov et al. 14]

Single message scenario: 4.62 cpb

Multi message scenario: 2.75 cpb

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 18

Page 35: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Software Performance

Software performance with Full-AES [Bogdanov et al. 14]

Single message scenario: 4.62 cpb

Multi message scenario: 2.75 cpb

Estimated software performance with 4-AES

Single message scenario: (18/30) · 4.62 cpb ≈ 2.77 cpb

Multi message scenario: (18/30) · 2.75 cpb = 1.65 cpb

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 18

Page 36: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

CAESAR Submission POET

Software Performance

Software performance with Full-AES [Bogdanov et al. 14]

Single message scenario: 4.62 cpb

Multi message scenario: 2.75 cpb

Estimated software performance with 4-AES

Single message scenario: (18/30) · 4.62 cpb ≈ 2.77 cpb

Multi message scenario: (18/30) · 2.75 cpb = 1.65 cpb

We are looking for developers for high speed implementations

(https://github.com/cforler/poet)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 18

Page 37: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

Section 3

Security of POET

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 19

Page 38: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

Birthday bound security

POET is CCA3 secure against nonce-respecting adversaries

AdvCCA3Π (q, ℓ, t) ≤ AdvIND-CPA

Π (q, ℓ, t ′)+AdvINT-CTXTΠ (q, ℓ, t ′′) (∗)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 20

Page 39: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

Birthday bound security

POET is CCA3 secure against nonce-respecting adversaries

AdvCCA3Π (q, ℓ, t) ≤ AdvIND-CCA

Π (q, ℓ, t ′)+AdvINT-CTXTΠ (q, ℓ, t ′′) (∗)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 20

Page 40: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

Birthday bound security

POET is CCA3 secure against nonce-respecting adversaries

AdvCCA3Π (q, ℓ, t) ≤ AdvIND-CCA

Π (q, ℓ, t ′)+AdvINT-CTXTΠ (q, ℓ, t ′′) (∗)

POET is OCCA3 secure against nonce-ignoring adversaries

AdvOCCA3Π (q, ℓ, t) ≤ AdvOPRP-CCA

Π (q, ℓ, t ′)+AdvINT-CTXTΠ (q, ℓ, t ′′) (∗)

(∗)t ′, t ′′ ∈ O(t)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 20

Page 41: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 42: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 43: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

2. Header collison (Pr[COLLad ])

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 44: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

2. Header collison (Pr[COLLad ])3. Top row collison (Pr[COLLtop])

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 45: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

2. Header collison (Pr[COLLad ])3. Top row collison (Pr[COLLtop])4. Bottom row collison (Pr[COLLbot ])

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 46: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

2. Header collison (Pr[COLLad ])3. Top row collison (Pr[COLLtop])4. Bottom row collison (Pr[COLLbot ])

A can distinguish POET without a collison (Pr[NOCOLL])

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 47: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 48: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 49: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 50: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 51: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫ

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 52: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫCollision between non final mesage blocks: ≤ ℓ2ǫ/2

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 53: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫCollision between non final mesage blocks: ≤ ℓ2ǫ/2

4. Collision in bottom row (see 3.)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 54: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫCollision between non final mesage blocks: ≤ ℓ2ǫ/2

4. Collision in bottom row (see 3.)

Pr[NOCOLL] can be upper bound by 9 · ℓ2/(2n − 3ℓ)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 55: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫCollision between non final mesage blocks: ≤ ℓ2ǫ/2

4. Collision in bottom row (see 3.)

Pr[NOCOLL] can be upper bound by 9 · ℓ2/(2n − 3ℓ)

AdvOPRP-CCAΠ (q, ℓ, t) ≤ 4ℓ2ǫ+ 9ℓ2

2n−3ℓ +AdvIND-SPRP

E ,E−1 (ℓ+2q,O(t))

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 56: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

POET: INT-CTXT-Security

INT-CTXT proof is game-based

Combines the ideas from its OPRP-CCA proof and the

INT-CTXT proof from McOE

Details (→ CAESAR submission)

INT-CTXT Advantage

AdvINT-CTXTPOET (q, ℓ, t) ≤ (ℓ+ 2q)2/2n +

q

2n − q+ AdvOPRP-CCA

Π (q, ℓ, t)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 23

Page 57: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

Restated Security Claims

Bits of Security

Confidentiality for the plaintext log2(2128 − c · ǫ · ℓ2)

Integrity for the plaintext log2(2128 − c · ǫ · ℓ2)

Integrity for the associated data log2(2128 − c · ǫ · ℓ2)

Integrity for the public message number log2(2128 − c · ǫ · ℓ2)

Security against key recovery 128

Security against tag guessing 128

Yu Sasaki pointed out that our stated security claims had been

confusing

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 24

Page 58: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

Conclusion

POET

is non-sequential and on-line

support for intermediate tags

is robust against nonce- and decryption-misuse

(OCCA3-secure = OPRP-CCA + INT-CTXT)

fulfills the demanding requirements of high-speed networks

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 25

Page 59: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

Conclusion

POET

is non-sequential and on-line

support for intermediate tags

is robust against nonce- and decryption-misuse

(OCCA3-secure = OPRP-CCA + INT-CTXT)

fulfills the demanding requirements of high-speed networks

Final Remark: Cryptanalysis, fruitful remarks and third party

implementation etc. will be rewarded!

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 25

Page 60: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

The End

Thank you for your attention!

POET Homepage

http://www.uni-weimar.de/de/medien/professuren/

mediensicherheit/research/poet/

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 26

Page 61: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

——————————————————————-

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 27

Page 62: Pipelineable On-Line Encryption with Tag (POET)2014.diac.cr.yp.to/slides/forler-poet.pdf · Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed2 Scott Fluhrer1 John Foley1

Security of POET

Key Derivation

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

POET needs five 128-bit keys: K ,K1, and K2, L, and LT

They are derived from a 128 bit master key SK

K = ESK (0), L = ESK (1)

K1 = ESK (2) K2 = ESK (3),

LT = ESK (4)

(currently I am analysing the case: K1 = K2 and LT = 7L)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 27