Authenticated Encryption in the Face of Protocol and Side-Channel Leakage

Size: px
Start display at page:

Download "Authenticated Encryption in the Face of Protocol and Side-Channel Leakage"

Transcription

1 Authenticated Encryption in the Face of Protocol and Side-Channel Leakage Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam University of Bristol Crete, 13 October 2017

2 What s it about? Keywords Authenticated Encryption: A key component of secure communication Provable Security: Bootstrapping security of a complex construction from a simple primitive, say a blockcipher or pseudorandom function. Protocol Leakage: Implementations of the construction that for whatever reason aren t perfect. This is not the same as blame the implementer! Side-Channel Leakage: Implementations of the primitive that are exposed to the real-world of DPA, cache-timing attacks, etc.

3 What s it about? Provable Security for the Real World The Good Secure Primitives + Provable Security = Secure Construction

4 What s it about? Provable Security for the Real World The Good Secure Primitives + Provable Security = Secure Construction The Security of Ciphertext Stealing Phillip Rogaway 1, Mark Wooding 2, and Haibin Zhang 1 1 Dept. of Computer Science, University of California, Davis, USA 2 Thales e-security Ltd, UK Abstract. We prove the security of CBC encryption with ciphertext stealing. Our results cover all versions of ciphertext stealing recently recommended by NIST. The complexity assumption is that the underlying blockcipher is a good PRP, and the security notion achieved is the strongest one commonly considered for chosen-plaintext attacks, indistinguishability from random bits (ind$-security). We go on to generalize these results to show that, when intermediate outputs are slightly delayed, one achieves ind$-security in the sense of an online encryption scheme, a notion we formalize that focuses on what is delivered across an online API, generalizing prior notions of blockwise-adaptive attacks. Finally, we pair our positive results with the observation that the version of ciphertext stealing described in Meyer and Matyas s well-known book (1982) is not secure. Keywords: blockwise-adaptive attacks, CBC, ciphertext stealing, cryptographic standards, modes of operation, provable security. 1 Introduction Ciphertext stealing. Many blockcipher modes require the input be a sequence of complete blocks, each having a number of bits that is the blockcipher s blocksize. One approach for dealing with inputs not of this form is ciphertext stealing. The classical combination is CBC encryption and ciphertext stealing, a mode going back to at least 1982 [14]. In 2010, NIST put out an addendum [8] to Special Publication A [7], the document that had defined blockcipher modes ECB, CBC, CFB, OFB, and CTR. The addendum defines three ways to enrich CBC with ciphertext stealing. The modes are named CBC-CS1, CBC-CS2, and CBC-CS3. See Fig. 1 for the definition of these modes, which differ only in the ordering of ciphertext bits. Despite the classicism of ciphertext-stealing, its adoption in standards, and the strong preferences, these days, for proven-secure modes, there has, until now, been no proof offered for CBC with ciphertext stealing. This paper fills in this. e begin by looking at the NIST ciphertext-stealing S. Assuming a random IV, we show ional form of chosenfrom Breaking and Repairing GCM Security Proofs Tetsu Iwata 1, Keisuke Ohashi 1, and Kazuhiko Minematsu 2 1 Nagoya University, Japan iwata@cse.nagoya-u.ac.jp, k oohasi@echo.nuee.nagoya-u.ac.jp 2 NEC Corporation, Japan k-minematsu@ah.jp.nec.com Abstract. In this paper, we study the security proofs of GCM (Galois/Counter Mode of Operation). We first point out that a lemma, which is related to the upper bound on the probability of a counter collision, is invalid. Both the original privacy and authenticity proofs by the designers are based on the lemma. We further show that the observation can be translated into a distinguishing attack that invalidates the main part of the privacy proof. It turns out that the original security proofs of GCM contain a flaw, and hence the claimed security bounds are not justified. A very natural question is then whether the proofs can be repaired. We give an affirmative answer to the question by presenting new security bounds, both for privacy and authenticity. As a result, although the security bounds are larger than what were previously claimed, GCM maintains its provable security. We also show that, when the nonce length is restricted to 96 bits, GCM has better security bounds than a general case of variable length nonces. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) Keywords: GCM, counter-example, distinguishing attack, proof of security. 1 Introduction Hugo Krawczyk GCM (Galois/Counter Mode of Operation) is the authenticated encryption mode of blockciphers designed by McGrew and Viega [26,27]. The mode is based on the counter mode encryption and the polynomial hash function, and the designers presented proofs of security both for privacy and authenticity [26,27]. It was selected as the NIST recommended blockcipher mode in 2007 [15], and is widely used in practice, e.g., in [1,2,4,5,6,7,8,14,17,19,20,25,33,34]. The security of GCM has been extensively evaluated. Ferguson pointed out that a forgery is possible if the tag length is short [16]. Joux showed that a part of the secret key can be obtained if the nonce is reused [21]. Handschuh and Preneel discussed weak keys of GCM and presented generalizations of Joux s attack [18]. Saarinen pointed out that GCM has more weak keys than previously known, and used the weak keys for forgery attacks [32]. See also [31] for comprehensive discussions on various aspects on GCM. Despite aforementioned attacks, it is widely considered that the provable security results of GCM are sound, in the sense that the previous attacks do not contradict the claimed security bounds by the designers, and that no flaw in the proofs has been identified. Some of these attacks show the tightness of the security bounds, and others are outside the security model (e.g., nonce reuse). Therefore, there is no attack that undermines the security bounds or th GCM uses the counter mode encryption, and the initial nonce, where there are two different ways to the length of the nonce. When padded with a EE Department, Technion, Haifa, Israel. hugo@ee.technion.ac.il Abstract. We study the question of how to generically compose symmetric encryption and authentication when building secure channels for the protection of communications over insecure networks. We show that any secure channels protocol designed to work with any combination of secure encryption (against chosen plaintext attacks) and secure MAC must use the encrypt-then-authenticate method. We demonstrate this by showing that the other common methods of composing encryption and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show an example of an encryption function that provides (Shannon s) perfect secrecy but when combined with any MAC function under the authenticate-then-encrypt method yields a totally insecure protocol (for example, finding passwords or credit card numbers transmitted under the protection of such protocol becomes an easy task for an active attacker). The same applies to the encrypt-and-authenticate method used in SSH. On the positive side we show that the authenticate-then-encrypt method cure if the encryption method in use is either CBC mode (with an a stream cipher (that xor the data neric The low-call diet: Authenticated Encryption for call c HSM users M. Bond 1, G. French 2, N.P. Smart 3, and G.J. Watson 3 1 Cryptomathic A/S, Cambridge, UK. 2 Barclays Bank Plc, London, UK. 3 University of Bristol, UK.. Abstract. We present a new mode of operation for obtaining authenticated encryption su in environments, e.g. banking and government, where cryptographic services are only ava Hardware Security Module (HSM) which protects the keys but offers a limited API. Th problem is that despite the existence of better modes of operation, modern HSMs still prov but a basic (unauthenticated) CBC mode of encryption, and since they mediate all access solutions must work around this. Our mode of operation makes only a single call to the provides a secure authenticated encryption scheme; authentication is obtained by manipula plaintext being passed to the HSM via a call to an unkeyed hash function. The scheme o siderable performance improvement compared to more traditional authenticated encryption which must be implemented using multiple calls to the HSM. Our new mode of operation with a proof of security, on the assumption that the underlying block cipher used in the CB a strong pseudorandom permutation, and that the hash function is modelled as a random 1 Introduction Authenticated symmetric encryption, namely an encryption scheme which is both INT-CTXT secure [3], is regarded as the goal for symmetric encryption. There is constructions in the literature for such authenticated encryption (AE) schemes. The these is the Encrypt-Then-MAC construction, which first encrypts the message usin encryption scheme and then appends a secure MAC to the ciphertext. Over the last special modes of operation have been defined which implement authenticated enc OCB [17], CCM [19], EAX [5] and GCM [12]. However, while these modes have for modern use and parallel services, there are some situations in which generic con Encrypt-Then-MAC) or special modes cannot be used. In the financial and government sectors, a common industrial deployment of c for keys to reside within a special piece of hardware known as a Hardware Secu HSM. Such HSMs store the keys and manipulate sensitive data on behalf of applica a measure of assurance that neither a lone corrupt insider manipulating his own external hacker will be able to steal or abuse cryptographic keys. Another benefit of is that they define the point at which any abuse of the key material may occur; so

5 What s it about? Provable Security for the Real World The Bad Secure Primitives + Provable Security + The Real World Secure Construction

6 What s it about? Provable Security for the Real World The Bad Secure Primitives + Provable Security + The Real World Secure Construction Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009, kenny.paterson}@rhul.ac.uk 27th February 2013 Abstract The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data in transit across untrusted networks. TLS has become the de facto secure protocol of choice for Internet and mobile applications. DTLS is a variant of TLS that is growing in importance. In this paper, we present distinguishing and plaintext recovery attacks against TLS and DTLS. The attacks are based on a delicate timing analysis of decryption processing in the two protocols. We include experimental results demonstrating the feasibility of the attacks in realistic network environments for several different implementations of TLS and DTLS, including the leading OpenSSL implementations. We provide countermeasures for the attacks. Finally, we discuss the wider implications of our attacks for the cryptographic design used by TLS and DTLS. Keywords TLS, DTLS, CBC-mode encryption, timing attack, plaintext recovery 1 Introduction TLS is arguably the most widely-used secure communications protocol on the Internet today. Starting life as SSL, the protocol was adopted by the IETF and specified as TLS 1.0 [10]. It has since evolved through TLS 1.1 [11] to the current version TLS 1.2 [12]. Various other RFCs define additional TLS cryptographic algorithms and extensions. TLS is now used for securing a wide variety of application-level traffic and has beious rival to IPsec for general VPN usage. It is widely er software and in cryptographic lies, and web applid 1.0 [31], which roughly matches TLS 1.1 and DTLS 1.2 [32], which aligns with TLS 1.2. Both TLS and DTLS are actually protocol suites, rather than single protocols. The main component of (D)TLS that concerns us here is the Record Protocol, which uses symmetric key cryptography (block ciphers, stream ciphers and MAC algorithms) in combination with sequence numbers to build a secure channel for transporting application-layer data. Other major components are the (D)TLS Handshake Protocol, which is responsible for authentication, session key establishment and ciphersuite negotiation, and the TLS Alert Protocol, which carries error messages and management traffic. Setting aside dedicated authenticated encryption algorithms (which are yet to see widespread support in TLS or DTLS implementations), the (D)TLS Record Protocol uses a MAC-Encode-Encrypt (MEE) construction. Here, the plaintext data to be transported is first passed through a MAC algorithm (along with certain header bytes) to create a MAC tag. The supported MAC algorithms are all HMAC-based, with MD5, SHA-1 and SHA-256 being the allowed hash algorithms in TLS 1.2 [12]. Then an encoding step takes place. For the RC4 stream cipher, this just involves concatenation of the plaintext and the MAC tag, while for CBC-mode encryption (the other possible option), the plaintext, MAC tag, and some encryption padding of a specified format are concatenated. In the encryption step, the encoded plaintext is encrypted with the selected cipher. In the case where CBC-mode is selected, the block cipher is DES, 3DES or AES (with DES being deprecated in TLS 1.2). Following [28], we refer to this MEE construction as MEE-TLS-CBC. We provide greater detail on its operation in the (D)TLS Record Protocol in Section 2. The widespread use of TLS (and the increasing use of DTLS) makes the continued study of the security of these protocols of great importance. Indeed, the evolution of the TLS l has largely been driven by cryptographic atagainst it, including those in The fragility of AES-GCM authentication algorithm Shay Gueron 1,2, Vlad Krasnov 2 1 Department of Mathematics, University of Haifa, Israel 2 Intel Corporation, Israel Development Center, Haifa, Israel March 15, 2013 Abstract. A new implementation of the GHASH function has been recently committed to a Git version of OpenSSL, to speed up AES-GCM. We identified a bug in that implementation, and made sure it was quickly fixed before trickling into an official OpenSSL trunk. Here, we use this (already fixed) bug as a real example that demonstrates the fragility of AES-GCM s authentication algorithm (GHASH). One might expect that incorrect MAC tag generation would only cause legitimate message-tag pairs to fail authentication (which is already a serious problem). However, since GHASH is a polynomial evaluation MAC, the bug can be exploited for actual message forgery. Keywords: AES-GCM, GHASH, polynomial evaluation MAC, message forgery, OpenSSL. 1 Introduction AES-GCM (Galois Counter Mode; [1]) is considered to be a most efficient NIST standard Authenticated Encryption scheme. Its software implementation on modern processors is an important optimization target, and various improvements have been introduced in the last few years (e.g., [2], [4]). Recently (February 2013 [8]), a new implementation of the function 'gcm_ghash_clmul' was been committed (by OpenSSL Development Team member A. Polyakov) to the Git version of OpenSSL [7], and was awaiting interception in the next revision (1.0.2) of this library. Since [8] was committed and also passed all of the built-in OpenSSL tests, it is fair to assume if it had not been intercepted, it would have appeared in the next OpenSSL version (1.0.2). We uncovered a bug in [8], and to stop it from appearing in an official OpenSSL version, we notified OpenSSL (March 5, 2013); the bug was fixed immediately (March 6; [9]). Therefore, the current situation allows us to analyze a real vulnerability (not just theoretical), but without pointing to a real exposure. We emphasize the following: although the message forgery vulnerability that we rep here can be reproduced from the references and examples we p security threat is already removed (even from the d As we show here, the crypto algorithm can exte ) #!% , Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL) Serge.Vaudenay@epfl.ch Abstract. In many standards, e.g. SSL/TLS, IPSEC, WTLS, messages are first pre-formatted, then encrypted in CBC mode with a block cipher. Decryption needs to check if the format is valid. Validity of the format is easily leaked from communication protocols in a chosen ciphertext attack since the receiver usually sends an acknowledgment or an error message. This is a side channel. In this paper we show various ways to perform an efficient side channel attack. We discuss potential applications, extensions to other padding schemes and various ways to fix the problem. 1 Introduction Variable input length encryption is traditionally constructed from a fixed input length encryption (namely a block cipher) in a special mode of operation. In RFC2040 [2], the RC5-CBC-PAD algorithm is proposed, based on RC5 which enables the encryption of blocks of b = 8 words where words are bytes. Encryption of any word sequence with an RC5 secret key K is performed as follows. 1. Pad the word sequence with n words, all being equal to n, such that 1 n b and the padded sequence has a length which is a multiple of b. 2. Write the padded word sequence as a block sequence x1,..., xn in which each block xi consists of b words. 3. Encrypt the block sequence in CBC mode with a (either fixed or random or secret) IV with a permutation C defined by RC5 with key K: get y1 = C(IV x1), yi = C(yi 1 xi); i = 2,..., N (1) where denotes the XOR operation. The encryption of the message is the block sequence y1,..., yn. Although decryption is not clearly defined in RFC2040 [2], it makes sense to assume that the receiver of an encrypted message first decrypts in CBC mode, then checks if the padding is correct and finally removes it. The question is: how must the receiver behave if the padding is not correct? Although the receiver should not tell the sender that the padding is not correct, it is meaningful that non-procession of a decrypted message ultimately leaks this bit of information.

7 What s it about? Provable Security for the Real World The Ugly Secure Primitives + Provable Security = Secure Construction + The Real World

8 What s it about? Provable Security for the Real World The Ugly Secure Primitives + Provable Security = Secure Construction + The Real World

9 What s it about? Provable Security for the Real World The Ugly Secure Primitives + Provable Security = Secure Construction + The Real World We need better models!

10 Authenticated Encryption Alice c = E N,A k (m) The Network Bob Two parties share a key and want to communicate securely Their messages should be confidential and authentic An adversary wants to stop them doing this

11 Authenticated Encryption Alice c = E N,A k (m) The Network Bob Two parties share a key and want to communicate securely Their messages should be confidential and authentic An adversary wants to stop them doing this

12 Authenticated Encryption Alice c =??? The Network Bob Two parties share a key and want to communicate securely Their messages should be confidential and authentic An adversary wants to stop them doing this

13 Modern AE A Brief History Standard BN00 First recognisable notion, probabilistic Rog02 Addition of Associated Data Rog04 Move to nonce-based RS06 Deterministic encryption, All-in-one definition Decryption Leakage BDPS13 Special leakage case of multiple decryption errors ABL14+ Special leakage case Release of Unverified Plaintext HKR15 Special leakage case based on Encode-then-Encrypt BPS15 Any deterministic leakage on invalid ciphertexts

14 Modern AE A Brief History Standard BN00 First recognisable notion, probabilistic Rog02 Addition of Associated Data Rog04 Move to nonce-based RS06 Deterministic encryption, All-in-one definition Decryption Leakage BDPS13 Special leakage case of multiple decryption errors ABL14+ Special leakage case Release of Unverified Plaintext HKR15 Special leakage case based on Encode-then-Encrypt BPS15 Any deterministic leakage on invalid ciphertexts

15 Outline 1 Modern Authenticated Encryption Syntax Security Composition 2 Leakage Scenarios Protocol Leakage Primitive Leakage AE under Leakage

16 Modern Authenticated Encryption Syntax Authenticated Encryption (AE) Syntax An Authenticated Encryption scheme is a pair of algorithms E : K N A M C D : K N A C M { } Where: K Key space N Nonce space A Associated Data M Message Space C Ciphertext Space Invalid ciphertext symbol

17 Modern Authenticated Encryption Syntax Authenticated Encryption (AE) Syntax An Authenticated Encryption scheme is a pair of algorithms E : K N A M C D : K N A C M { } Nice-Behaviour Assumptions Correctness D N,A k Tidyness E N,A k (D N,A k (E N,A k (m)) = m (c)) = c whenever D N,A k (c) Length-Regular E N,A k (m) = m + τ( m )

18 Modern Authenticated Encryption Security Authenticated Encryption (AE) All-in-One Security Notion [RS06] E k A A $ D k How well can an adversary distinguish?

19 Modern Authenticated Encryption Security Authenticated Encryption (AE) All-in-One Security Notion [RS06] Exp ae-0 E (A) Exp ae-1 E (A) E k A A $ D k Real AE world Ideal AE world Adv ae E (A) = [ Pr Exp ae-0 E (A) = 0 ] Pr [ Exp ae-1 E (A) = 0 ]

20 Modern Authenticated Encryption Security Authenticated Encryption (AE) All-in-One Security Notion [RS06] E k A A $ D k This single notion is equivalent to IND CPA + ciphertext integrity

21 Modern Authenticated Encryption Security Authenticated Encryption (AE) All-in-One Security Notion [RS06] E k A A $ The IND CPA game

22 Modern Authenticated Encryption Security Authenticated Encryption (AE) All-in-One Security Notion [RS06] E k E k A A D k The ciphertext integrity game

23 Modern Authenticated Encryption Security Authenticated Encryption (AE) Security Flavours E k E k A D k E k really E N,A k (m) Any restrictions on N, A, m?

24 Modern Authenticated Encryption Security Authenticated Encryption (AE) Security Flavours E k How can A pick N? E k D k A E k really E N,A k (m) Any restrictions on N, A, m? iv random (initial vector) n unique (nonce, number used once) mr no restrictions (misuse-resistant)

25 Modern Authenticated Encryption Security Authenticated Encryption (AE) Security Flavours E k How can A pick N? E k D k A E k really E N,A k (m) Any restrictions on N, A, m? iv random (initial vector) n unique (nonce, number used once) mr no restrictions (misuse-resistant) No restrictions on A, m

26 Modern Authenticated Encryption Security Authenticated Encryption (AE) Aspects to Ignore secret nonces LoR, RoR, Inj multi-user and corruptions variable length tags and stretch streaming and online issues

27 Modern Authenticated Encryption Composition Generic Composition Goals of Composition Domain extension From fixed input length (FIL) to variable input length (VIL) hash-then-mac, CTR, CBC, CFB, etc. Boost security From iv via n to mr randomize-then-encrypt Compose security confidentiality + integrity authenticated encryption Encrypt-then-Mac, Mac-then-Encrypt, Encrypt-and-Mac

28 Modern Authenticated Encryption Composition Domain Extension Cipher FeedBack Mode (CFB) I M 1 M 2 M 3 M 4 F k F k F k F k C 1 C 2 C 3 C 4

29 Modern Authenticated Encryption Composition Boosting Security From IV-based to Nonce-based N M F kf I ive ke Randomized IV Using an independently keyed PRF to turn the nonce into a random iv. C

30 Modern Authenticated Encryption Composition Generic Composition Nonce-based Encrypt-then-Mac [NRS14] N M A N M E ke F kf I ive ke T km + C T C The scheme N2 IV-to-N Conversion

31 Modern Authenticated Encryption Composition Generic Composition Nonce-based Encrypt-then-Mac [NRS14] N M A N M E ke F kf I ive ke T km + C T C The scheme N2 IV-to-N Conversion

32 Modern Authenticated Encryption Composition Generic Composition Nonce-based Encrypt-then-Mac [NRS14] N M A F kf I ive ke T km C T The scheme A5

33 Modern Authenticated Encryption Composition Generic Composition Nonce-based Encrypt-then-Mac [NRS14] N M A F kf I ive ke T km C T The Encrypt-and-MAC scheme A1

34 Leakage Scenarios Protocol Leakage Multiple Decryption Errors Implementation Details Matter... [BDPS13] N M A F kf I ive ke T km C T The Encrypt-and-MAC scheme A1 Adding Padding Imagine that M is a bitstring ive only accepts blockstrings Natural to include encoding: {0, 1} ({0, 1} n )

35 Leakage Scenarios Protocol Leakage Multiple Decryption Errors Implementation Details Matter... [BDPS13] N M A F kf I ive ke T km C T The Encrypt-and-MAC scheme A1 Decryption errors Now two errors could occur: The MAC verification fails The encoding was invalid These errors might be distinguishable!

36 Leakage Scenarios Protocol Leakage Release of Unverified Plaintext (RUP) Implementation Details Matter Too [ABLMMY14] N M A F kf I ive ke T km C T The Encrypt-and-MAC scheme A1

37 Leakage Scenarios Protocol Leakage Release of Unverified Plaintext (RUP) Implementation Details Matter Too [ABLMMY14] N M A F kf I ive ke T km C T The Encrypt-and-MAC scheme A1 Decryption buffers In order to verify M is needed What if it leaks before? Release of Unverified Plaintexts

38 Leakage Scenarios Protocol Leakage Subtle Authenticated Encryption Joint work with Guy Barwell and Dan Page Λ k Λ k E k A A $ D k Deterministic Leakage for Decryption Failures Leakage oracle Λ k returns if D k doesn t Relationships between notions reconsidered

39 Leakage Scenarios Protocol Leakage Comparison of Robust AE notions Joint work with Guy Barwell and Dan Page RAE[τ] [HKR15] SAE RUPAE [ABLMMY14] CTI scpa + ERR-CPA + IND-CPA INT RUP + DI + IND-CPA [BDPS13] IND$ CCA3

40 Leakage Scenarios Protocol Leakage Protocol Leakage Beyond Subtle Authenticated Encryption N M A F kf I ive ke T km C T E k /$ D k / Λ k A What about Other Wires? For instance I could leak during encryption (relevant for SS-MPC) Or even the correct tag during decryption!?

41 Leakage Scenarios Primitive Leakage Blockciphers and PRFs Leaking S-boxes Low-level primitive Blockciphers (or FIL-PRFs) are the smallest building block for AE They might still leak about internal variables... such as noisy Hamming weight of first-round S-box

42 Leakage Scenarios Primitive Leakage Blockciphers and PRFs Leaking S-boxes Low-level primitive Blockciphers (or FIL-PRFs) are the smallest building block for AE They might still leak about internal variables... such as noisy Hamming weight of first-round S-box Challenge Many countermeasures (masking) to thwart key recovery But how does primitive leakage affect larger construction s security? How to model and argue about such leakage?

43 Leakage Scenarios Primitive Leakage Only Computation Leaks Information Micali Reyzin s Framework For each computation Assume the adversary can specify a leakage function To model leakage on the current computation s input Granularity of the modelling of the computation affects what can leak! Different models emerge by considering different classes of leakage functions.

44 Leakage Scenarios Primitive Leakage Leakage Resilience A Fully-Specified Framework based on OCLI [DP08] Continuous and Arbitrary Leakage Leakage functions are only restricted in their output length to prevent leaking the full input. Repeated invocation results in leakage cumulating.

45 Leakage Scenarios Primitive Leakage Leakage Resilience A Fully-Specified Framework based on OCLI [DP08] Continuous and Arbitrary Leakage Leakage functions are only restricted in their output length to prevent leaking the full input. Repeated invocation results in leakage cumulating. Caveats The model allows future leakage The model allows inefficient leakage functions Split-state model (like masking) inevitable

46 Leakage Scenarios AE under Leakage Authenticated Encryption, Revisited Deconstructing the Rogaway Shrimpton Definition Goals What does the adversary want to do? Learn something about the content of a message Send a message that was not intended Powers What can they do to help them achieve this? Some sort of oracle access they ve discovered/created eg request encryptions or decryptions

47 Leakage Scenarios AE under Leakage Authenticated Encryption, Revisited Deconstructing the Rogaway Shrimpton Definition Goals What does the adversary want to do? Distinguish encryptions from random Distinguish real decryption from one that always rejects Powers What can they do to help them achieve this? Make queries to an honest encryption oracle Make queries to an honest decryption oracle Implicitly usurped by goal oracles How does leakage fit in?

48 Leakage Scenarios AE under Leakage Authenticated Encryption, Revisited Powers and Goals E k D k E k D k E k A A $ D k Looking at powers and goals simultaneously

49 Leakage Scenarios AE under Leakage Authenticated Encryption, Revisited Powers and Goals E k D k E k D k E k A A $ D k The oracles corresponding to powers

50 Leakage Scenarios AE under Leakage Authenticated Encryption, Revisited Powers and Goals E k D k E k D k E k A A $ D k The oracles corresponding to goals

51 Leakage Scenarios AE under Leakage Authenticated Encryption, Revisited Different Adversarial Powers Goals Ek Dk Ek Dk Ek Dk Ek Dk PAS CPA CDA CCA Ek/$ IND Dk/ Ek/$ AE Dk/ Ek/$ CTI Dk/

52 Leakage Scenarios AE under Leakage Authenticated Encryption with Leakage Modelling Choices E k D k Modelling Leakage E k /$ D k / A Only true E k and D k leak Adversary picks leakage function Security is relative to a class of leakage functions.

53 Leakage Scenarios AE under Leakage Authenticated Encryption with Leakage Modelling Choices E k D k Modelling Leakage E k /$ D k / A Only true E k and D k leak Adversary picks leakage function Security is relative to a class of leakage functions. Leaking on challenge oracles can sometimes be reasonable (SS-MPC), but not in a leakage-resilience setting.

54 Leakage Scenarios AE under Leakage Generic Composition Revisited, Revisited How Well do the [NRS14] Schemes hold up? Decimating the NRS Schemes N M A F kf I ive ke C T km T NRS identified eight favoured schemes A1 A4 are Encrypt-and-Mac A5 and A6 are Encrypt-then-Mac A7 and A8 are Mac-then-Encrypt Only A5 and A6 cope well with leakage. For composition, need to relate leakage classes!

55 Leakage Scenarios AE under Leakage Generic Composition Revisited, Revisited How Well do the [NRS14] Schemes hold up? Decimating the NRS Schemes N M A F kf I ive ke C T km T NRS identified eight favoured schemes A1 A4 are Encrypt-and-Mac A5 and A6 are Encrypt-then-Mac A7 and A8 are Mac-then-Encrypt Only A5 and A6 cope well with leakage. Only A4 was mrae

56 Leakage Scenarios AE under Leakage The New Mode SIVAT MRAE with Leakage N M A N M A F kf ive ke ivd ke V km T km I C T I C T SIVAT is MRAE with Leakage If the underlying primitives are the Mac-verification doesn t leak the true tag the PRF is strongly adaptive secure Note ive can be instantiated with CFB.

57 Leakage Scenarios AE under Leakage Conclusion Results 1 A general framework to argue about AE in the face of leakage 2 Shown that A5, A6 (and CFB) behave mostly as expected provided tag verification doesn t recompute the tag 4 Showed a pairing-based fully adaptive leakage-resilient PRF secure in the generic group model.

58 Leakage Scenarios AE under Leakage Conclusion Results 1 A general framework to argue about AE in the face of leakage 2 Shown that A5, A6 (and CFB) behave mostly as expected provided tag verification doesn t recompute the tag 4 Showed a pairing-based fully adaptive leakage-resilient PRF secure in the generic group model. Open Problems Ever more AE definitional options; can one deal with various options more cleanly? Do other constructions allow weaker assumptions on the PRF? How leakage-resilient can standard model PRFs get?

On Symmetric Encryption with Distinguishable Decryption Failures

On Symmetric Encryption with Distinguishable Decryption Failures On Symmetric Encryption with Distinguishable Decryption Failures Alexandra Boldyreva, Jean Paul Degabriele, Kenny Paterson, and Martijn Stam FSE - 12th Mar 2013 Outline Distinguishable Decryption Failures

More information

Symmetric-Key Cryptography Part 1. Tom Shrimpton Portland State University

Symmetric-Key Cryptography Part 1. Tom Shrimpton Portland State University Symmetric-Key Cryptography Part 1 Tom Shrimpton Portland State University Building a privacy-providing primitive I want my communication with Bob to be private -- Alice What kind of communication? SMS?

More information

Feedback Week 4 - Problem Set

Feedback Week 4 - Problem Set 4/26/13 Homework Feedback Introduction to Cryptography Feedback Week 4 - Problem Set You submitted this homework on Mon 17 Dec 2012 11:40 PM GMT +0000. You got a score of 10.00 out of 10.00. Question 1

More information

Information Security CS526

Information Security CS526 Information CS 526 Topic 3 Ciphers and Cipher : Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA 1 Announcements HW1 is out, due on Sept 10 Start early, late policy is 3 total late days for

More information

The OCB Authenticated-Encryption Algorithm

The OCB Authenticated-Encryption Algorithm The OCB Authenticated-Encryption Algorithm Ted Krovetz California State University, Sacramento, USA Phillip Rogaway University of California, Davis, USA IETF 83 Paris, France CFRG 11:20-12:20 in 212/213

More information

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018 Lecture 6: Symmetric Cryptography CS 5430 February 21, 2018 The Big Picture Thus Far Attacks are perpetrated by threats that inflict harm by exploiting vulnerabilities which are controlled by countermeasures.

More information

symmetric cryptography s642 computer security adam everspaugh

symmetric cryptography s642 computer security adam everspaugh symmetric cryptography s642 adam everspaugh ace@cs.wisc.edu computer security Announcement Midterm next week: Monday, March 7 (in-class) Midterm Review session Friday: March 4 (here, normal class time)

More information

Computer Security CS 526

Computer Security CS 526 Computer Security CS 526 Topic 4 Cryptography: Semantic Security, Block Ciphers and Encryption Modes CS555 Topic 4 1 Readings for This Lecture Required reading from wikipedia Block Cipher Ciphertext Indistinguishability

More information

Multiple forgery attacks against Message Authentication Codes

Multiple forgery attacks against Message Authentication Codes Multiple forgery attacks against Message Authentication Codes David A. McGrew and Scott R. Fluhrer Cisco Systems, Inc. {mcgrew,sfluhrer}@cisco.com May 31, 2005 Abstract Some message authentication codes

More information

Message authentication codes

Message authentication codes Message authentication codes Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2017/18) Content Introduction security of MAC Constructions block cipher

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information

Goals of Modern Cryptography

Goals of Modern Cryptography Goals of Modern Cryptography Providing information security: Data Privacy Data Integrity and Authenticity in various computational settings. Data Privacy M Alice Bob The goal is to ensure that the adversary

More information

: Practical Cryptographic Systems March 25, Midterm

: Practical Cryptographic Systems March 25, Midterm 650.445: Practical Cryptographic Systems March 25, 2010 Instructor: Matthew Green Midterm Name: As with any exam, please do not collaborate or otherwise share information with any other person. You are

More information

Scanned by CamScanner

Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Symmetric-Key Cryptography CS 161: Computer Security

More information

symmetric cryptography s642 computer security adam everspaugh

symmetric cryptography s642 computer security adam everspaugh symmetric cryptography s642 adam everspaugh ace@cs.wisc.edu computer security Announcements Midterm next week: Monday, March 7 (in-class) Midterm Review session Friday: March 4 (here, normal class time)

More information

Pipelineable On-Line Encryption (POE)

Pipelineable On-Line Encryption (POE) Pipelineable On-Line Encryption (POE) FSE 2014 Farzaneh Abed 2 Scott Fluhrer 1 John Foley 1 Christian Forler 2 Eik List 2 Stefan Lucks 2 David McGrew 1 Jakob Wenzel 2 1 Cisco Systems, 2 Bauhaus-Universität

More information

Content of this part

Content of this part UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 5 More About Block Ciphers Israel Koren ECE597/697 Koren Part.5.1 Content of this

More information

1 Achieving IND-CPA security

1 Achieving IND-CPA security ISA 562: Information Security, Theory and Practice Lecture 2 1 Achieving IND-CPA security 1.1 Pseudorandom numbers, and stateful encryption As we saw last time, the OTP is perfectly secure, but it forces

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

Symmetric Crypto MAC. Pierre-Alain Fouque

Symmetric Crypto MAC. Pierre-Alain Fouque Symmetric Crypto MAC Pierre-Alain Fouque Message Authentication Code (MAC) Warning: Encryption does not provide integrity Eg: CTR mode ensures confidentiality if the blockcipher used is secure. However,

More information

CLOC: Authenticated Encryption

CLOC: Authenticated Encryption CLOC: Authenticated Encryption for Short Input Tetsu Iwata, Nagoya University Kazuhiko Minematsu, NEC Corporation Jian Guo, Nanyang Technological University Sumio Morioka, NEC Europe Ltd. FSE 2014 March

More information

Authenticated Encryption

Authenticated Encryption 18733: Applied Cryptography Anupam Datta (CMU) Authenticated Encryption Online Cryptography Course Authenticated Encryption Active attacks on CPA-secure encryption Recap: the story so far Confidentiality:

More information

ECE 646 Lecture 8. Modes of operation of block ciphers

ECE 646 Lecture 8. Modes of operation of block ciphers ECE 646 Lecture 8 Modes of operation of block ciphers Required Reading: I. W. Stallings, "Cryptography and Network-Security," 5 th and 6 th Edition, Chapter 6 Block Cipher Operation II. A. Menezes, P.

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Message Authentication Codes Syntax: Key space K λ Message space M Tag space T λ MAC(k,m) à σ Ver(k,m,σ) à 0/1 Correctness: m,k,

More information

Summary on Crypto Primitives and Protocols

Summary on Crypto Primitives and Protocols Summary on Crypto Primitives and Protocols Levente Buttyán CrySyS Lab, BME www.crysys.hu 2015 Levente Buttyán Basic model of cryptography sender key data ENCODING attacker e.g.: message spatial distance

More information

Proofs for Key Establishment Protocols

Proofs for Key Establishment Protocols Information Security Institute Queensland University of Technology December 2007 Outline Key Establishment 1 Key Establishment 2 3 4 Purpose of key establishment Two or more networked parties wish to establish

More information

Misuse-resistant crypto for JOSE/JWT

Misuse-resistant crypto for JOSE/JWT Misuse-resistant crypto for JOSE/JWT Neil Madden OAuth Security Workshop, 2018 1 JOSE Content Encryption Methods Provide authenticated encryption AES-CBC with HMAC-SHA2 Requires random 128-bit IV Must

More information

Symmetric-Key Cryptography

Symmetric-Key Cryptography Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016 Announcements Project due Sept 20 Special guests Alice Bob The attacker (Eve - eavesdropper, Malice) Sometimes Chris

More information

Unit 8 Review. Secure your network! CS144, Stanford University

Unit 8 Review. Secure your network! CS144, Stanford University Unit 8 Review Secure your network! 1 Basic Problem Internet To first approximation, attackers control the network Can snoop, replay, suppress, send How do we defend against this? Communicate securely despite

More information

A Surfeit of SSH Cipher Suites

A Surfeit of SSH Cipher Suites A Surfeit of SSH Cipher Suites Jean Paul Degabriele Information Security Group www.isg.rhul.ac.uk/~psai074 Based in part on slides by Kenny Paterson Outline of this talk Overview of SSH and related work

More information

Permutation-based Authenticated Encryption

Permutation-based Authenticated Encryption Permutation-based Authenticated Encryption Gilles Van Assche 1 1 STMicroelectronics COST Training School on Symmetric Cryptography and Blockchain Torremolinos, Spain, February 2018 1 / 44 Outline 1 Why

More information

Authenticated Encryption in TLS

Authenticated Encryption in TLS Authenticated Encryption in TLS Same modelling & verification approach concrete security: each lossy step documented by a game and a reduction (or an assumption) on paper Standardized complications - multiple

More information

Data Integrity & Authentication. Message Authentication Codes (MACs)

Data Integrity & Authentication. Message Authentication Codes (MACs) Data Integrity & Authentication Message Authentication Codes (MACs) Goal Ensure integrity of messages, even in presence of an active adversary who sends own messages. Alice (sender) Bob (receiver) Fran

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 5 More About Block Ciphers ver. November 26, 2010 Last modified 10-2-17

More information

Block ciphers. CS 161: Computer Security Prof. Raluca Ada Popa. February 26, 2016

Block ciphers. CS 161: Computer Security Prof. Raluca Ada Popa. February 26, 2016 Block ciphers CS 161: Computer Security Prof. Raluca Ada Popa February 26, 2016 Announcements Last time Syntax of encryption: Keygen, Enc, Dec Security definition for known plaintext attack: attacker provides

More information

Permutation-based symmetric cryptography

Permutation-based symmetric cryptography Permutation-based symmetric cryptography Guido Bertoni 1 Joan Daemen 1 Michaël Peeters 2 Gilles Van Assche 1 1 STMicroelectronics 2 NXP Semiconductors Keccak & SHA-3 Day Université Libre de Bruxelles March

More information

1 Defining Message authentication

1 Defining Message authentication ISA 562: Information Security, Theory and Practice Lecture 3 1 Defining Message authentication 1.1 Defining MAC schemes In the last lecture we saw that, even if our data is encrypted, a clever adversary

More information

Cryptography CS 555. Topic 11: Encryption Modes and CCA Security. CS555 Spring 2012/Topic 11 1

Cryptography CS 555. Topic 11: Encryption Modes and CCA Security. CS555 Spring 2012/Topic 11 1 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security CS555 Spring 2012/Topic 11 1 Outline and Readings Outline Encryption modes CCA security Readings: Katz and Lindell: 3.6.4, 3.7 CS555 Spring

More information

Cryptographic Hash Functions

Cryptographic Hash Functions ECE458 Winter 2013 Cryptographic Hash Functions Dan Boneh (Mods by Vijay Ganesh) Previous Lectures: What we have covered so far in cryptography! One-time Pad! Definition of perfect security! Block and

More information

Data Integrity & Authentication. Message Authentication Codes (MACs)

Data Integrity & Authentication. Message Authentication Codes (MACs) Data Integrity & Authentication Message Authentication Codes (MACs) Goal Ensure integrity of messages, even in presence of an active adversary who sends own messages. Alice (sender) Bob (reciever) Fran

More information

Message Authentication ( 消息认证 )

Message Authentication ( 消息认证 ) Message Authentication ( 消息认证 ) Sheng Zhong Yuan Zhang Computer Science and Technology Department Nanjing University 2017 Fall Sheng Zhong, Yuan Zhang (CS@NJU) Message Authentication ( 消息认证 ) 2017 Fall

More information

AWS Key Management Service (KMS) Handling cryptographic bounds for use of AES-GCM

AWS Key Management Service (KMS) Handling cryptographic bounds for use of AES-GCM AWS Key Management Service (KMS) Handling cryptographic bounds for use of AES-GCM Matthew Campagna Amazon Web Services Shay Gueron Amazon Web Services University of Haifa 1 Outline The AWS Key Management

More information

CIS 4360 Secure Computer Systems Symmetric Cryptography

CIS 4360 Secure Computer Systems Symmetric Cryptography CIS 4360 Secure Computer Systems Symmetric Cryptography Professor Qiang Zeng Spring 2017 Previous Class Classical Cryptography Frequency analysis Never use home-made cryptography Goals of Cryptography

More information

Lecture 4: Authentication and Hashing

Lecture 4: Authentication and Hashing Lecture 4: Authentication and Hashing Introduction to Modern Cryptography 1 Benny Applebaum Tel-Aviv University Fall Semester, 2011 12 1 These slides are based on Benny Chor s slides. Some Changes in Grading

More information

Introduction to Cryptography. Lecture 3

Introduction to Cryptography. Lecture 3 Introduction to Cryptography Lecture 3 Benny Pinkas March 6, 2011 Introduction to Cryptography, Benny Pinkas page 1 Pseudo-random generator seed s (random, s =n) Pseudo-random generator G Deterministic

More information

Course Map. COMP 7/8120 Cryptography and Data Security. Learning Objectives. How to use PRPs (Block Ciphers)? 2/14/18

Course Map. COMP 7/8120 Cryptography and Data Security. Learning Objectives. How to use PRPs (Block Ciphers)? 2/14/18 Course Map Key Establishment Authenticated Encryption Key Management COMP 7/8120 Cryptography and Data Security Lecture 8: How to use Block Cipher - many time key Stream Ciphers Block Ciphers Secret Key

More information

Cryptography 2017 Lecture 3

Cryptography 2017 Lecture 3 Cryptography 2017 Lecture 3 Block Ciphers - AES, DES Modes of Operation - ECB, CBC, CTR November 7, 2017 1 / 1 What have seen? What are we discussing today? What is coming later? Lecture 2 One Time Pad

More information

CS155. Cryptography Overview

CS155. Cryptography Overview CS155 Cryptography Overview Cryptography! Is n A tremendous tool n The basis for many security mechanisms! Is not n The solution to all security problems n Reliable unless implemented properly n Reliable

More information

CS 495 Cryptography Lecture 6

CS 495 Cryptography Lecture 6 CS 495 Cryptography Lecture 6 Dr. Mohammad Nabil Alaggan malaggan@fci.helwan.edu.eg Helwan University Faculty of Computers and Information CS 495 Fall 2014 http://piazza.com/fci_helwan_university/fall2014/cs495

More information

McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes

McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes Ewan Fleischmann Christian Forler Stefan Lucks Bauhaus-Universität Weimar FSE 2012 Fleischmann, Forler, Lucks. FSE 2012. McOE:

More information

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10r. Recitation assignment & concept review Paul Krzyzanowski Rutgers University Spring 2018 April 3, 2018 CS 419 2018 Paul Krzyzanowski 1 1. What is a necessary condition for perfect

More information

Lecture 8: Cryptography in the presence of local/public randomness

Lecture 8: Cryptography in the presence of local/public randomness Randomness in Cryptography Febuary 25, 2013 Lecture 8: Cryptography in the presence of local/public randomness Lecturer: Yevgeniy Dodis Scribe: Hamidreza Jahanjou So far we have only considered weak randomness

More information

CS155. Cryptography Overview

CS155. Cryptography Overview CS155 Cryptography Overview Cryptography Is n n A tremendous tool The basis for many security mechanisms Is not n n n n The solution to all security problems Reliable unless implemented properly Reliable

More information

Updates on CLOC and SILC Version 3

Updates on CLOC and SILC Version 3 Updates on CLOC and SILC Version 3 Tetsu Iwata*, Kazuhiko Minematsu, Jian Guo, Sumio Morioka, and Eita Kobayashi DIAC 2016 September 26, 2016, Nagoya, Japan * Supported in part by JSPS KAKENHI, Grant in

More information

Cryptography [Symmetric Encryption]

Cryptography [Symmetric Encryption] CSE 484 / CSE M 584: Computer Security and Privacy Cryptography [Symmetric Encryption] Spring 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin,

More information

Lecture 8 - Message Authentication Codes

Lecture 8 - Message Authentication Codes Lecture 8 - Message Authentication Codes Benny Applebaum, Boaz Barak October 12, 2007 Data integrity Until now we ve only been interested in protecting secrecy of data. However, in many cases what we care

More information

Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic

Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic 1 TLS Encryption 1. Asymmetric key exchange RSA, DHE,

More information

Authenticated Encryption

Authenticated Encryption 18733: Applied Cryptography Anupam Datta (CMU) Authenticated Encryption Online Cryptography Course Authenticated Encryption Active attacks on CPA-secure encryption Recap: the story so far Confidentiality:

More information

Midgame Attacks. (and their consequences) Donghoon Chang 1 and Moti Yung 2. IIIT-Delhi, India. Google Inc. & Columbia U., USA

Midgame Attacks. (and their consequences) Donghoon Chang 1 and Moti Yung 2. IIIT-Delhi, India. Google Inc. & Columbia U., USA Midgame Attacks (and their consequences) Donghoon Chang 1 and Moti Yung 2 1 IIIT-Delhi, India 2 Google Inc. & Columbia U., USA Crypto is a Technical Science As technology moves, so should crypto designs

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University February 8 2018 Review CPA-secure construction Security proof by reduction

More information

How to Use Your Block Cipher? Palash Sarkar

How to Use Your Block Cipher? Palash Sarkar How to Use Your Block Cipher? Palash Sarkar Applied Statistics Unit Indian Statistical Institute, Kolkata India palash@isical.ac.in IACITS New Delhi, 2 nd April 2009 Palash Sarkar (ISI, Kolkata) Using

More information

Cryptography and Network Security Chapter 12. Message Authentication. Message Security Requirements. Public Key Message Encryption

Cryptography and Network Security Chapter 12. Message Authentication. Message Security Requirements. Public Key Message Encryption Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 12 Message Authentication Codes At cats' green on the Sunday he took the message from

More information

Lecture 8. 1 Some More Security Definitions for Encryption Schemes

Lecture 8. 1 Some More Security Definitions for Encryption Schemes U.C. Berkeley CS276: Cryptography Lecture 8 Professor David Wagner February 9, 2006 Lecture 8 1 Some More Security Definitions for Encryption Schemes 1.1 Real-or-random (rr) security Real-or-random security,

More information

Cryptography CS 555. Topic 8: Modes of Encryption, The Penguin and CCA security

Cryptography CS 555. Topic 8: Modes of Encryption, The Penguin and CCA security Cryptography CS 555 Topic 8: Modes of Encryption, The Penguin and CCA security 1 Reminder: Homework 1 Due on Friday at the beginning of class Please typeset your solutions 2 Recap Pseudorandom Functions

More information

Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24

Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24 Assume encryption and decryption use the same key. Will discuss how to distribute key to all parties later Symmetric ciphers unusable for authentication of sender Lecturers: Mark D. Ryan and David Galindo.

More information

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL)) Introduction (Mihir Bellare Text/Notes: http://cseweb.ucsd.edu/users/mihir/cse207/) Cryptography provides: Data Privacy Data Integrity and Authenticity Crypto-systems all around us ATM machines Remote

More information

Introduction to Cryptography. Lecture 6

Introduction to Cryptography. Lecture 6 Introduction to Cryptography Lecture 6 Benny Pinkas page 1 1 Data Integrity, Message Authentication Risk: an active adversary might change messages exchanged between Alice and Bob M Alice M M M Bob Eve

More information

Implementing Cryptography: Good Theory vs. Bad Practice

Implementing Cryptography: Good Theory vs. Bad Practice Implementing Cryptography: Good Theory vs. Bad Practice Viet Pham Information Security Group, Department of Mathematics Royal Holloway, University of London Outline News report What is cryptography? Why

More information

A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security. T. Shrimpton October 18, 2004

A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security. T. Shrimpton October 18, 2004 A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security T. Shrimpton October 18, 2004 Abstract In this note we introduce a variation of the standard definition of chosen-ciphertext

More information

Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes

Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes CSE 484 / CSE M 584: Computer Security and Privacy Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes Spring 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu

More information

Practical Aspects of Modern Cryptography

Practical Aspects of Modern Cryptography Practical Aspects of Modern Cryptography Lecture 3: Symmetric s and Hash Functions Josh Benaloh & Brian LaMacchia Meet Alice and Bob Alice Bob Message Modern Symmetric s Setup: Alice wants to send a private

More information

Symmetric Encryption 2: Integrity

Symmetric Encryption 2: Integrity http://wwmsite.wpengine.com/wp-content/uploads/2011/12/integrity-lion-300x222.jpg Symmetric Encryption 2: Integrity With material from Dave Levin, Jon Katz, David Brumley 1 Summing up (so far) Computational

More information

Lecture 18 Message Integrity. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller & Bailey s ECE 422

Lecture 18 Message Integrity. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller & Bailey s ECE 422 Lecture 18 Message Integrity Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller & Bailey s ECE 422 Cryptography is the study/practice of techniques for secure communication,

More information

Advanced Cryptography 1st Semester Symmetric Encryption

Advanced Cryptography 1st Semester Symmetric Encryption Advanced Cryptography 1st Semester 2007-2008 Pascal Lafourcade Université Joseph Fourrier, Verimag Master: October 22th 2007 1 / 58 Last Time (I) Security Notions Cyclic Groups Hard Problems One-way IND-CPA,

More information

Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol

Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Protocol Mihir Bellare UC San Diego mihir@cs.ucsd.edu Tadayoshi Kohno UC San Diego tkohno@cs.ucsd.edu Chanathip Namprempre Thammasat

More information

TLS Security Where Do We Stand? Kenny Paterson

TLS Security Where Do We Stand? Kenny Paterson TLS Security Where Do We Stand? Kenny Paterson (based on joint work with Nadhem AlFardan, Dan Bernstein, Bertram Poettering, Jacob Schuldt) Information Security Group Outline TLS and the TLS Record Protocol

More information

Computational Security, Stream and Block Cipher Functions

Computational Security, Stream and Block Cipher Functions Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for

More information

Some Aspects of Block Ciphers

Some Aspects of Block Ciphers Some Aspects of Block Ciphers Palash Sarkar Applied Statistics Unit Indian Statistical Institute, Kolkata India palash@isical.ac.in CU-ISI Tutorial Workshop on Cryptology, 17 th July 2011 Palash Sarkar

More information

Cryptographic hash functions and MACs

Cryptographic hash functions and MACs Cryptographic hash functions and MACs Myrto Arapinis School of Informatics University of Edinburgh October 05, 2017 1 / 21 Introduction Encryption confidentiality against eavesdropping 2 / 21 Introduction

More information

Lecture 9 Authenticated Encryption

Lecture 9 Authenticated Encryption Lecture 9 Authenticated Encryption COSC260 Codes and Ciphers Adam O Neill Adapted from http://cseweb.ucsd.edu/~mihir/cse107/ Setting the Stage We have previously studied the goals of privacy and authenticity

More information

Block Cipher Operation. CS 6313 Fall ASU

Block Cipher Operation. CS 6313 Fall ASU Chapter 7 Block Cipher Operation 1 Outline q Multiple Encryption and Triple DES q Electronic Codebook q Cipher Block Chaining Mode q Cipher Feedback Mode q Output Feedback Mode q Counter Mode q XTS-AES

More information

Plaintext-Recovery Attacks Against Datagram TLS

Plaintext-Recovery Attacks Against Datagram TLS Information Security Group Royal Holloway, University of London 6th Feb 2012 Contents 1 Results 2 3 4 Padding Oracle Realisation Against OpenSSL 5 Attacking the GnuTLS Implementation of DTLS 6 Results

More information

n-bit Output Feedback

n-bit Output Feedback n-bit Output Feedback Cryptography IV Encrypt Encrypt Encrypt P 1 P 2 P 3 C 1 C 2 C 3 Steven M. Bellovin September 16, 2006 1 Properties of Output Feedback Mode No error propagation Active attacker can

More information

Automated Analysis and Synthesis of Modes of Operation and Authenticated Encryption Schemes

Automated Analysis and Synthesis of Modes of Operation and Authenticated Encryption Schemes Automated Analysis and Synthesis of Modes of Operation and Authenticated Encryption Schemes Alex J. Malozemoff University of Maryland Joint work with Matthew Green, Viet Tung Hoang, and Jonathan Katz Presented

More information

Symmetric Cryptography

Symmetric Cryptography CSE 484 (Winter 2010) Symmetric Cryptography Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

Symmetric Cryptography

Symmetric Cryptography CSE 484 (Winter 2010) Symmetric Cryptography Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

CSC 5930/9010 Modern Cryptography: Cryptographic Hashing

CSC 5930/9010 Modern Cryptography: Cryptographic Hashing CSC 5930/9010 Modern Cryptography: Cryptographic Hashing Professor Henry Carter Fall 2018 Recap Message integrity guarantees that a message has not been modified by an adversary Definition requires that

More information

Block cipher modes. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 75

Block cipher modes. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 75 Block cipher modes Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 75 Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 76 Block cipher modes Block ciphers (like

More information

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney. Overview of SSL/TLS Luke Anderson luke@lukeanderson.com.au 12 th May 2017 University Of Sydney Overview 1. Introduction 1.1 Raw HTTP 1.2 Introducing SSL/TLS 2. Certificates 3. Attacks Introduction Raw

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Symmetric Cryptography January 20, 2011 Practical Aspects of Modern Cryptography 2 Agenda Symmetric key ciphers Stream ciphers Block ciphers Cryptographic hash

More information

Block Cipher Modes of Operation

Block Cipher Modes of Operation Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 23 rd March 2018 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book

More information

Secure Internet Communication

Secure Internet Communication Secure Internet Communication Can we prevent the Cryptocalypse? Dr. Gregor Koenig Barracuda Networks AG 09.04.2014 Overview Transport Layer Security History Orientation Basic Functionality Key Exchange

More information

Homework 2: Symmetric Crypto Due at 11:59PM on Monday Feb 23, 2015 as a PDF via websubmit.

Homework 2: Symmetric Crypto Due at 11:59PM on Monday Feb 23, 2015 as a PDF via websubmit. Homework 2: Symmetric Crypto February 17, 2015 Submission policy. information: This assignment MUST be submitted as a PDF via websubmit and MUST include the following 1. List of collaborators 2. List of

More information

Security & Indistinguishability in the Presence of Traffic Analysis

Security & Indistinguishability in the Presence of Traffic Analysis Security & Indistinguishability in the Presence of Traffic Analysis Cristina Onete 1 Daniele Venturi 2 1 Darmstadt University of Technology & CASED, Germany www.minicrypt.de 2 SAPIENZA University of Rome,

More information

Cryptography. Recall from last lecture. [Symmetric] Encryption. How Cryptography Helps. One-time pad. Idea: Computational security

Cryptography. Recall from last lecture. [Symmetric] Encryption. How Cryptography Helps. One-time pad. Idea: Computational security Recall from last lecture Cryptography To a first approximation, attackers control network Next two lectures: How to defend against this 1. Communicate securely despite insecure networks cryptography 2.

More information

Paper presentation sign up sheet is up. Please sign up for papers by next class. Lecture summaries and notes now up on course webpage

Paper presentation sign up sheet is up. Please sign up for papers by next class. Lecture summaries and notes now up on course webpage 1 Announcements Paper presentation sign up sheet is up. Please sign up for papers by next class. Lecture summaries and notes now up on course webpage 2 Recap and Overview Previous lecture: Symmetric key

More information

Securing IoT applications with Mbed TLS Hannes Tschofenig Arm Limited

Securing IoT applications with Mbed TLS Hannes Tschofenig Arm Limited Securing IoT applications with Mbed TLS Hannes Tschofenig Agenda Theory Threats Security services Hands-on with Arm Keil MDK Pre-shared secret-based authentication (covered in webinar #1) TLS Protocol

More information

Block ciphers, stream ciphers

Block ciphers, stream ciphers Block ciphers, stream ciphers (start on:) Asymmetric cryptography CS 161: Computer Security Prof. Raluca Ada Popa Jan 31, 2018 Announcements Project 1 is out, due Feb 14 midnight Recall: Block cipher A

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

ABC - A New Framework for Block Ciphers. Uri Avraham

ABC - A New Framework for Block Ciphers. Uri Avraham ABC - A New Framework for Block Ciphers Uri Avraham ABC - A New Framework for Block Ciphers Research Thesis Submitted in partial fulfillment of the requirements for the degree of Master of Science in

More information