Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Misuse-Resistant Variants of the OMD Authenticated Encryption Mode
 
conference paper

Misuse-Resistant Variants of the OMD Authenticated Encryption Mode

Reyhanitabar, Reza  
•
Vaudenay, Serge  
•
Vizár, Damian  
2014
Provable Security, Provsec 2014
The Eighth International Conference on Provable Security (ProvSec 2014)

We present two variants of OMD which are robust against nonce misuse. Security of OMD---a CAESAR candidate---relies on the assumption that implementations always ensure correct use of nonce (a.k.a. message number); namely that, the nonce never gets repeated. However, in some application environments, this non-repetitiveness requirement on nonce might be compromised or ignored, yielding to full collapse of the security guaranty. We aim to reach maximal possible level of robustness against repeated nonces, as defined by Rogaway and Shrimpton (FSE 2006) under the name misuse-resistant AE (MRAE). Our first scheme, called misuse-resistant OMD (MR-OMD), is designed to be substantially similar to OMD while achieving stronger security goals; hence, being able to reuse any existing common code/hardware. Our second scheme, called parallelizable misuse-resistant OMD (PMR-OMD), further deviates from the original OMD design in its encryption process, providing a parallelizable algorithm, in contrast with OMD and MR-OMD which have serial encryption/decryption processes. Both MR-OMD and PMR-OMD are single-key mode of operation. It is known that maximally robust MRAE schemes are necessarily two-pass, a price paid compared to a one-pass scheme such as OMD. Nevertheless, in MR-OMD and PMR-OMD, we combine the two passes in a way that minimizes the incurred additional cost: the overhead incurred by the second pass in our two-pass variants is about 50 % of the encryption time for OMD.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-319-12475-9_5
Web of Science ID

WOS:000345592800005

Author(s)
Reyhanitabar, Reza  
Vaudenay, Serge  
Vizár, Damian  
Date Issued

2014

Publisher

Springer-Verlag Berlin

Publisher place

Berlin

Published in
Provable Security, Provsec 2014
ISBN of the book

978-3-319-12475-9

978-3-319-12474-2

Total of pages

16

Series title/Series vol.

Lecture Notes in Computer Science

Volume

8782

Start page

55

End page

70

Subjects

authenticated encryption

•

misuse-resistance

•

OMD

•

CAESAR competition

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
The Eighth International Conference on Provable Security (ProvSec 2014)

Hong Kong, China

October 9-10, 2014

Available on Infoscience
August 8, 2014
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/105446
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés