stronger security guarantees for authenticated …ciphertext fragmentationdistinguishable decryption...

49
Ciphertext Fragmentation Distinguishable Decryption Failures Stronger Security Guarantees for Authenticated Encryption Schemes Alexandra Boldyreva, Jean Paul Degabriele, Kenny Paterson, and Martijn Stam DIAC Workshop - 5th July 2012 Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 1/22

Upload: others

Post on 30-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Stronger Security Guarantees forAuthenticated Encryption Schemes

Alexandra Boldyreva, Jean Paul Degabriele, Kenny Paterson,and Martijn Stam

DIAC Workshop - 5th July 2012

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 1/22

Page 2: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Scope of This Talk

Arguably the best way we have of assessing the security of anAuthenticated Encryption (AE) scheme is through its securityproof.

There are various criteria for assessing security proofs: securitynotion, tightness and quantitative bounds, assumptions, etc. butmost importantly we want security to hold in in practice!

This relates to how well our theoretic framework capturesreal-world scenarios. In this talk we consider two aspects thatthat current cryptographic theory fails to address.

We here outline recent and upcoming work of ours to addressthese, and propose new design criteria for AE schemes.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 2/22

Page 3: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Outline

1 Ciphertext Fragmentation

2 Distinguishable Decryption Failures

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 3/22

Page 4: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Outline

1 Ciphertext Fragmentation

2 Distinguishable Decryption Failures

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 4/22

Page 5: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation

ChannelAlice Bob

Under normal operation the channel delivers ciphertexts in afragmented fashion, where:

a) The fragmentation pattern is arbitrary.

b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

Page 6: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation

ChannelAlice Bob

Under normal operation the channel delivers ciphertexts in afragmented fashion, where:

a) The fragmentation pattern is arbitrary.

b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

Page 7: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation

ChannelAlice Bob

Under normal operation the channel delivers ciphertexts in afragmented fashion, where:

a) The fragmentation pattern is arbitrary.

b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

Page 8: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation

ChannelAlice Bob

Under normal operation the channel delivers ciphertexts in afragmented fashion, where:

a) The fragmentation pattern is arbitrary.

b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

Page 9: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext Fragmentation

ChannelAlice Bob

Under normal operation the channel delivers ciphertexts in afragmented fashion, where:

a) The fragmentation pattern is arbitrary.

b) But the order of the fragments is preserved.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 5/22

Page 10: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Why is it a Problem?

This setting emerges in practice, one such instance is that ofsecure network protocols.

AE schemes are NOT designed to operate in this setting, and itis left to the protocol designer to adapt the scheme into one thatsupports ciphertext fragmentation (hoping that security ispreserved).

However as the following two examples show, security in theusual ‘atomic’ setting does not guarantee security in thefragmented setting.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 6/22

Page 11: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext-Fragmentation Attacks

SSH:

A proof of security (IND-sfCCA) for SSH was given in [BKN 04].

Yet [APW 09] presented plaintext-recovery attacks against SSH.

IPsec in MAC-then-encrypt (CBC):

[Kra 01] proves that MAC-then-encrypt with CBC encryption issecure (secure channel [CK 01]).

[MT 10] show that MAC-then-encode-then-encrypt (injective /CBC) is secure (secure channel [Mau 11]).

[DP 10] present ciphertext-fragmentation attacks against suchIPsec configurations.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 7/22

Page 12: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext-Fragmentation Attacks

SSH:

A proof of security (IND-sfCCA) for SSH was given in [BKN 04].

Yet [APW 09] presented plaintext-recovery attacks against SSH.

IPsec in MAC-then-encrypt (CBC):

[Kra 01] proves that MAC-then-encrypt with CBC encryption issecure (secure channel [CK 01]).

[MT 10] show that MAC-then-encode-then-encrypt (injective /CBC) is secure (secure channel [Mau 11]).

[DP 10] present ciphertext-fragmentation attacks against suchIPsec configurations.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 7/22

Page 13: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Ciphertext-Fragmentation Attacks

SSH:

A proof of security (IND-sfCCA) for SSH was given in [BKN 04].

Yet [APW 09] presented plaintext-recovery attacks against SSH.

IPsec in MAC-then-encrypt (CBC):

[Kra 01] proves that MAC-then-encrypt with CBC encryption issecure (secure channel [CK 01]).

[MT 10] show that MAC-then-encode-then-encrypt (injective /CBC) is secure (secure channel [Mau 11]).

[DP 10] present ciphertext-fragmentation attacks against suchIPsec configurations.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 7/22

Page 14: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

The Case of SSH

SSH encrypts messages in the following format:

> 4 bytes

PacketLength

Padding Length

SequenceNumber Payload Padding

ENCRYPT

MAC

CiphertextMessage MAC tag

Ciphertext Packet

4 bytes 4 bytes 1 byte

SSH commonly uses CBC mode for encryption.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 8/22

Page 15: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

Intercepted Ciphertext

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

Page 16: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗i

Intercepted Ciphertext

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

Page 17: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗i

Intercepted Ciphertext

Submit for Decryption

c∗i

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

Page 18: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗i

Intercepted Ciphertext

Submit for Decryption

p∗i?

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

Page 19: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗i

Intercepted Ciphertext

Submit for Decryption

p∗i?

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

Page 20: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗i

Intercepted Ciphertext

Submit for Decryption

p∗i

⊥MAC

?

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

Page 21: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗i

Intercepted Ciphertext

Submit for Decryption

p∗i

⊥MAC

?

L

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

Page 22: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

The SSH Attack (Main Idea)

c∗i

Intercepted Ciphertext

Submit for Decryption

p∗i

⊥MAC

L

L

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 9/22

Page 23: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Our Treatment of FragmentationFrom EUROCRYPT 12

We define a syntax and a correctness requirement forencryption in the fragmented setting.

We introduce indistinguishability under chosen-fragmentattacks.

We identify and formalise two other security goals that arise inrelation to ciphertext fragmentation.

We construct a scheme, InterMAC, that meets all three of oursecurity notions.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 10/22

Page 24: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Chosen-Fragment Security

IND-sfCCA [BKN 04] extends IND-CCA to protect against replayand out-of-order delivery attack.

We extend IND-sfCCA to the fragmented setting, IND-sfCFA(Chosen Fragment Attack).

We provide a generic construction for transforming an atomicscheme into a fragmented scheme.

Starting from an atomic IND-sfCCA secure scheme, and aprefix-free encoding, the construction gives a fragmentedscheme that is IND-sfCFA secure.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 11/22

Page 25: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Chosen-Fragment Security

IND-sfCCA [BKN 04] extends IND-CCA to protect against replayand out-of-order delivery attack.

We extend IND-sfCCA to the fragmented setting, IND-sfCFA(Chosen Fragment Attack).

We provide a generic construction for transforming an atomicscheme into a fragmented scheme.

Starting from an atomic IND-sfCCA secure scheme, and aprefix-free encoding, the construction gives a fragmentedscheme that is IND-sfCFA secure.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 11/22

Page 26: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

But There’s More!

Our construction shows that Chosen-Fragment Security is notthat hard to achieve!

Protocol designers aim to reduce susceptibility to TrafficAnalysis. Heuristic approach: Leak the least informationpossible.

Many mechanisms to support ciphertext fragmentation exposethe scheme to fragmentation-related DoS attacks.

Additionally meeting these security goals without compromisingconfidentiality is more difficult! - as exemplified by the details ofthe SSH attack.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 12/22

Page 27: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Boundary Hiding

As noted earlier SSH encrypts the length field. This does notconceal the message length but does hide ciphertext boundaries(in the passive case).

Boundary Hiding (Informally): Given a concatenation ofciphertexts, no adversary can determine where the ciphertextboundaries lie.

Intuitively this captures (in part) a weak form of resilience againstTraffic Analysis.

Conflicting goals: intuitively to support ciphertext fragmentation(correctness), the decryption algorithm requires the ability todetermine ciphertext boundaries.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 13/22

Page 28: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Denial of Service

The SSH standard (RFC 4253) suggests limiting the maximumvalue of the length field in order to mitigate against certaindenial-of-service attacks.

Otherwise an adversary could alter the contents of the lengthfield to indicate a very large value. The receiver would theninterpret all subsequent ciphertexts as part of this largeciphertext – connection hang.

Such denial-of-service attacks are not specific to SSH, but toencryption schemes supporting fragmentation in general.

Informally a scheme is N-DOS-sfCFA secure, if no adversarycan produce an N-bit long sequence of ciphertext fragments (notoutput by the encryption oracle) such that the decryptionalgorithm returns ε throughout.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 14/22

Page 29: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Denial of Service

The SSH standard (RFC 4253) suggests limiting the maximumvalue of the length field in order to mitigate against certaindenial-of-service attacks.

Otherwise an adversary could alter the contents of the lengthfield to indicate a very large value. The receiver would theninterpret all subsequent ciphertexts as part of this largeciphertext – connection hang.

Such denial-of-service attacks are not specific to SSH, but toencryption schemes supporting fragmentation in general.

Informally a scheme is N-DOS-sfCFA secure, if no adversarycan produce an N-bit long sequence of ciphertext fragments (notoutput by the encryption oracle) such that the decryptionalgorithm returns ε throughout.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 14/22

Page 30: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Design Criteria ISecurity Under Ciphertext Fragmentation

AE schemes are used extensively to secure communication overpacket-based networks, such as TCP/IP. The channel over whichthe scheme has to operate is often a fragmentation channel.

As such a good AE scheme should support or be easilyextendible to operate over fragmentation channels.

Specifically the scheme should preserve confidentiality(chosen-fragment security), and it should be robust againstfragmentation-related DoS attacks (i.e. tunable to be N-DOSsecure for a reasonable range of N values).

We don’t consider Boundary Hiding to be essential, but it wouldbe a nice additional feature.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 15/22

Page 31: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Outline

1 Ciphertext Fragmentation

2 Distinguishable Decryption Failures

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 16/22

Page 32: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security

Channel

Sender Receiver

Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

Page 33: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security

Channel

Sender Receiver

Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

Page 34: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security

Channel

Sender Receiver

Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

Page 35: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security

Channel

Sender Receiver

Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

Page 36: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security

Channel

Sender Receiver

Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

Page 37: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security

Channel

Sender Receiver

Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

Page 38: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security

Channel

Sender Receiver

Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

Page 39: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Justifying IND-CCA Security

Channel

Sender Receiver

Adversary

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 17/22

Page 40: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

A Gap in the Argument

Krawczyk’s proof can be extended to show thatMAC-then-encrypt with CBC encryption is IND-CCA secure.

Yet, attacks against TLS [CHVV 03], DTLS [AP 12], and IPsec[DP 10] have successfully managed to break instantiations ofthis construction through this type of attacks.

PROBLEM: Our formalism implicitly assumes that an adversarycannot distinguish between decryption failures (Distinctdecryption failures always return ⊥).

We do not capture the fact that invalid ciphertexts may leakmore information beyond their invalidity!

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 18/22

Page 41: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

A Gap in the Argument

Krawczyk’s proof can be extended to show thatMAC-then-encrypt with CBC encryption is IND-CCA secure.

Yet, attacks against TLS [CHVV 03], DTLS [AP 12], and IPsec[DP 10] have successfully managed to break instantiations ofthis construction through this type of attacks.

PROBLEM: Our formalism implicitly assumes that an adversarycannot distinguish between decryption failures (Distinctdecryption failures always return ⊥).

We do not capture the fact that invalid ciphertexts may leakmore information beyond their invalidity!

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 18/22

Page 42: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Possible Remedies

Suggestion A: Ensure at the implementation stage that distinctdecryption failures are indistinguishable.

History shows that this is rather difficult to achieve in practice.

Suggestion B: Formulate the scheme to have distinguishabledecryption failures, then prove security under this formalism.

Thereby making security less implementation-dependent.

Syntactically the resulting scheme is different, and requiresrevisiting some of the established relations for AE.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 19/22

Page 43: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Possible Remedies

Suggestion A: Ensure at the implementation stage that distinctdecryption failures are indistinguishable.

History shows that this is rather difficult to achieve in practice.

Suggestion B: Formulate the scheme to have distinguishabledecryption failures, then prove security under this formalism.

Thereby making security less implementation-dependent.

Syntactically the resulting scheme is different, and requiresrevisiting some of the established relations for AE.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 19/22

Page 44: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Possible Remedies

Suggestion A: Ensure at the implementation stage that distinctdecryption failures are indistinguishable.

History shows that this is rather difficult to achieve in practice.

Suggestion B: Formulate the scheme to have distinguishabledecryption failures, then prove security under this formalism.

Thereby making security less implementation-dependent.

Syntactically the resulting scheme is different, and requiresrevisiting some of the established relations for AE.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 19/22

Page 45: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Revisiting the Basics

Bellare and Namprempre introduced the following simple butuseful relations:

IND-CPA ∧ INT-CTXT ⇒ IND-CCA INT-CTXT ⇒ INT-PTXT.

Since then INT-CTXT and IND-CPA have become the commonlyaccepted security benchmark for AE.

Rogaway and Shrimpton later elegantly combined these twonotions into a single one, sometimes referred to as IND-CCA3.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 20/22

Page 46: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Revisiting the Basics

Bellare and Namprempre introduced the following simple butuseful relations:

IND-CPA ∧ INT-CTXT ⇒ IND-CCA INT-CTXT ⇒ INT-PTXT.

Since then INT-CTXT and IND-CPA have become the commonlyaccepted security benchmark for AE.

Rogaway and Shrimpton later elegantly combined these twonotions into a single one, sometimes referred to as IND-CCA3.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 20/22

Page 47: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Revisiting the Basics

For schemes with multiple errors there exists the followingseparation:

IND-CPA ∧ INT-CTXT 6⇒ IND-CCA.

Hence IND-CPA and INT-CTXT no longer guarantee strongconfidentiality, and are not suited as the target security notion formultiple-error AE schemes.

In ongoing work we extend these security notions to the multipleerror case (non-trivial), and we establish similar relations in orderto guarantee IND-CCA security and INT-PTXT.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 21/22

Page 48: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Revisiting the Basics

For schemes with multiple errors there exists the followingseparation:

IND-CPA ∧ INT-CTXT 6⇒ IND-CCA.

Hence IND-CPA and INT-CTXT no longer guarantee strongconfidentiality, and are not suited as the target security notion formultiple-error AE schemes.

In ongoing work we extend these security notions to the multipleerror case (non-trivial), and we establish similar relations in orderto guarantee IND-CCA security and INT-PTXT.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 21/22

Page 49: Stronger Security Guarantees for Authenticated …Ciphertext FragmentationDistinguishable Decryption Failures Scope of This Talk Arguably the best way we have of assessing the security

Ciphertext Fragmentation Distinguishable Decryption Failures

Design Criteria IIDistinguishable Decryption Failures

A good AE scheme should have implementation-robustsecurity; in the sense that security should be preserved in most‘reasonable’ practical realisations of the scheme.

To guard against distinguishable decryption failures, eachtest condition in the decryption algorithm that determinesciphertext validity should return a unique error symbol.

Chosen-ciphertext security should then be proved for theresulting multiple-error scheme.

Alternatively the approach could be applied to a scheme’simplementation to verify that it remains secure.

Boldyreva, Degabriele, Paterson, and Stam | Stronger Security Guarantees for Authenticated Encryption Schemes 22/22