UCL Discovery Stage
UCL home » Library Services » Electronic resources » UCL Discovery Stage

Beyond conventional security in sponge-based authenticated encryption modes

Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan; (2023) Beyond conventional security in sponge-based authenticated encryption modes. Journal of Cryptology , 32 pp. 895-940. 10.1007/s00145-018-9299-7. Green open access

[thumbnail of Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.pdf]
Preview
Text
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.pdf - Other

Download (1MB) | Preview

Abstract

The Sponge function is known to achieve 2c/2 security, where c is its capacity. This bound was carried over to its keyed variants, such as SpongeWrap, to achieve a min{2c/2, 2κ } security bound, with κ the key length. Similarly, many CAESAR competition submissions were designed to comply with the classical 2c/2 security bound. We show that Sponge-based constructions for authenticated encryption can achieve the significantly higher bound of min{2b/2, 2c, 2κ }, with b > c the permutation size, by proving that the CAESAR submission NORX achieves this bound. The proof relies on rigorous computation of multi-collision probabilities, which may be of independent interest. We additionally derive a generic attack based on multi-collisions that matches the bound. We show how to apply the proof to five other Sponge-based CAESAR submissions: Ascon, CBEAM/STRIBOB, ICEPOLE, Keyak, and two out of the three PRIMATEs. A direct application of the result shows that the parameter choices of some of these submissions are overly conservative. Simple tweaks render the schemes considerably more efficient without sacrificing security. We finally consider the remaining one of the three PRIMATEs, APE, and derive a blockwise adaptive attack in the noncerespecting setting with complexity 2c/2, therewith demonstrating that the techniques cannot be applied to APE.

Type: Article
Title: Beyond conventional security in sponge-based authenticated encryption modes
Open access status: An open access version is available from UCL Discovery
DOI: 10.1007/s00145-018-9299-7
Publisher version: https://doi.org/10.1007/s00145-018-9299-7
Language: English
Additional information: This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Keywords: Authenticated encryption, CAESAR, Ascon, CBEAM, ICEPOLE, Keyak, NORX, PRIMATEs, STRIBOB, Multi-collisions.
UCL classification: UCL
UCL > Provost and Vice Provost Offices > UCL BEAMS
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science
URI: https://discovery-pp.ucl.ac.uk/id/eprint/10182191
Downloads since deposit
40Downloads
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item