Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Authenticated Encryption with Variable Stretch
 
conference paper

Authenticated Encryption with Variable Stretch

Reyhanitabar, Reza  
•
Vizár, Damian  
•
Vaudenay, Serge  
2016
Advances In Cryptology - Asiacrypt 2016, Pt I
22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security

In conventional authenticated-encryption (AE) schemes, the ciphertext expansion, a.k.a.stretch or tag length, is a constant or a parameter of the scheme that must be fixed per key. However, using variable-length tags per key can be desirable in practice or may occur as a result of a misuse. The RAE definition by Hoang, Krovetz, and Rogaway (Eurocrypt 2015), aiming at the best-possible AE security, supports variable stretch among other strong features, but achieving the RAE goal incurs a particular inefficiency: neither encryption nor decryption can be online. The problem of enhancing the well-established nonce-based AE (nAE) model and the standard schemes thereof to support variable tag lengths per key, without sacrificing any desirable functional and efficiency properties such as online encryption, has recently regained interest as evidenced by extensive discussion threads on the CFRG forum and the CAESAR competition. Yet there is a lack of formal definition for this goal. First, we show that several recently proposed heuristic measures trying to augment the known schemes by inserting the tag length into the nonce and/or associated data fail to deliver any meaningful security in this setting. Second, we provide a formal definition for the notion of nonce-based variable-stretch AE (nvAE) as a natural extension to the traditional nAE model. Then, we proceed by showing a second modular approach to formalizing the goal by combining the nAE notion and a new property we call key-equivalent separation by stretch (kess). It is proved that (after a mild adjustment to the syntax) any nAE scheme which additionally fulfills the kess property will achieve the nvAE goal. Finally, we show that the nvAE goal is efficiently and provably achievable; for instance, by simple tweaks to off-the-shelf schemes such as OCB.

  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-662-53887-6_15
Web of Science ID

WOS:000389692500015

Author(s)
Reyhanitabar, Reza  
Vizár, Damian  
Vaudenay, Serge  
Date Issued

2016

Publisher

Springer-Verlag Berlin

Publisher place

Berlin

Published in
Advances In Cryptology - Asiacrypt 2016, Pt I
ISBN of the book

978-3-662-53887-6

978-3-662-53886-9

Total of pages

30

Series title/Series vol.

Lecture Notes in Computer Science

Volume

10031

Start page

396

End page

425

Subjects

Authenticated encryptionVariable-length tags

•

Robustness

•

Security definitions

•

CAESAR competition

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security

Hanoi, Vietnam

December 4-8, 2016

Available on Infoscience
December 21, 2016
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/132149
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés