1. Introduction
The Galois Counter Mode (GCM) of operation introduced by McGrew and Viega is a very famous authenticated encryption (AE) mode [1]. Due to its friendly hardware implementation, superior software performance, no patent, and provable security, it has been widely used in high-speed network application environments. For example, GCM with the Advanced Encryption Standard (AES) has been used in IETF Transport Layer Security protocol TLS 1.3. Now, GCM has been included in the recommendations of NIST, ISO/IEC, IEEE, and IETF. As GCM is widely deployed, the CAESAR competition takes it as the baseline algorithm, which further promotes the research of GCM. There exist a large number of research results related to GCM [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16].
GCM is a nonce-based AE mode. It takes a nonce as an extra input and requires that the nonce used in the encryption oracle is distinct (nonce-respecting setting). If the nonce length is restricted to 96 bits, GCM is provably birthday-bound secure up to approximately adversarial queries in the nonce-respecting setting [3,5], where n is the block-size of the underlying block cipher.
However, the nonce-respecting assumption does not fit the actual situation. The nonce is often misused in real life, bringing serious security threats. Joux found that, if the nonce is misused, then the hash key of GCM can be leaked and the leaked hash key can be utilized to achieve a universal forgery attack [2]. To settle the nonce misuse problem of GCM at little cost, Gueron and Lindell introduced a nonce-misuse-resistant AE (NMAE or MRAE) scheme GCM-SIV at CCS 2015 [11]. GCM-SIV covers GCM components and follows the SIV approach by Rogaway and Shrimpton [17]. In fact, as the syntax and the security model of NMAE became formalized, more and more NMAE schemes were proposed, such as [11,12,13,14,15,16,17,18,19,20,21,22,23]. GCM-SIV is just the first NMAE scheme that introduces SIV into GCM. GCM-SIV is proven secure even if the nonce is repeated. In 2016, Iwata and Minematsu pointed out that there exists a trivial distinguishing attack with approximately adversarial queries in GCM-SIV, where k is the bits of keys, and then presented an improved variant of GCM-SIV, called GCM-SIV1, which is proven secure up to (birthday bound) adversarial queries in the nonce misuse setting [12]. Furthermore, they considered a stronger security bound, and then proposed beyond-birthday-bound (BBB)-secure GCM-SIVr schemes that combine instances of GCM-SIV1. BBB indicates that cryptographic schemes can resist beyond adversarial queries. The BBB-secure AE schemes are very rich, such as CHM [24], GCM-SIVr [12], SCT [20], ZAE [21], and PFBw [25]. GCM-SIVr is proven BBB-secure against adversarial queries in the nonce misuse setting. Later, an updated variant of GCM-SIV called AES-GCM-SIV was proposed by Gueron et al., and AES-GCM-SIV was eventually accepted as a recommended standardization of IETF Crypto Forum Research Group [13,15]. Iwata and Seurin also made some important contributions to the promotion of standardization. They pointed out the problems in the earlier version, corrected them, and gave some suggestions for improving the key derivation function [14]. These problems and suggestions are accepted to further improve AES-GCM-SIV [15]. Unlike GCM-SIV, AES-GCM-SIV utilizes a key derivation function to generate the hash key and the encryption key, utilizes POLYVAL instead of GHASH, and invokes the full authentication tag as an initial counter. At Eurocrypt 2018, Bose et al. further considered the multi-user security, faster key derivation, and better bounds of AES-GCM-SIV [16].
Although there exists a large amount of research literature on the nonce misuse setting, the number of nonce misuse is often described vaguely. An effective measure of nonce misuse is the maximum number of its multi-collisions. To specify the level of nonce misuse, Dutta et al. introduced a quantitative index of nonce misuse for message authentication code (MAC) algorithms called the number of faulty nonces [23]. In the faulty nonce setting, a query is called as a faulty query if the nonce in this query is the same as the nonce in the previous queries, i.e., the nonce is re-used. The symbol is usually used to indicate the number of faulty nonces. Therefore, the faulty nonce setting covers nonce-respecting and nonce misuse settings. For an adversary that makes, at most, faulty queries, (1) if , then the adversary is called a nonce-respecting adversary; (2) if , then the adversary is called a nonce-misusing adversary. Dutta et al. presented a nonce-based MAC scheme, nEHtM, that ensures BBB security with graceful degradation in the faulty nonce setting [23]. Furthermore, they introduced an nEHtM-based AE scheme, CWC+, whose privacy is optimally secure in the nonce-respecting setting and whose authenticity is BBB-secure with graceful degradation in the faulty nonce setting. To ensure the faulty nonce misuse resistance of privacy and authenticity, Choi et al. introduced the first fully faulty nonce-misuse-resistant AE scheme SCM [22]. It utilizes a hash key and three encryption keys. From the perspective of the security, SCM ensures close-to optimal n-bit security in the nonce-respecting setting and supports graceful BBB security degradation (not only for privacy but also for authenticity) in the faulty nonce setting. In recent years, the research about the faulty nonce-misuse-resistant schemes mainly focuses on MACs [26,27]. This paper aims to introduce the faulty nonce setting to GCM-SIVr, and presents an improved AE scheme that ensures full BBB security with graceful degradation in the faulty nonce setting and utilizes as few keys as possible.
Our Contribution. We focus on the optimization of GCM-SIVr in the faulty nonce setting, and propose an optimal tradeoff between GCM-SIV1 and GCM-SIV2 called GCM-SIV1.5, which ensures full BBB security with graceful degradation in the faulty nonce setting. Specifically, our contribution includes:
From the point of view of the design, we introduce a BBB-secure sum of permutation (SoP) construction to encryption and authentication parts of GCM-SIV1.5, which makes GCM-SIV1.5 BBB secure. GCM-SIV1.5 follows “MAC-then-Encrypt” (MtE). The authentication part of GCM-SIV1.5 utilizes the construction proposed by Chen et al. [27] to ensure BBB security, and the encryption part of GCM-SIV1.5 is generated by SoP-based counter mode with an initial vector and a nonce to provide BBB security. Moreover, to minimize costs of key management and implementation on software and hardware, and to maximize the running speed, GCM-SIV1.5 just utilizes two block cipher keys and a hash key, invokes a hash function and twice plaintext blocks, and generates an authentication tag. More importantly, all encryption operations involving the nonce can be carried out offline, which saves half of the online computing resources.
From the point of view of the security, we prove that GCM-SIV1.5 enjoys BBB security with graceful degradation in the nonce faulty setting by using mirror theory, alternating events lemma, and the H-coefficient technique. Assuming that the underlying block cipher is a secure pseudorandom permutation (PRP) and the hash function is XOR-universal, then GCM-SIV1.5 is proven secure up to approximately -bit query complexity and approximately n-bit forgery attempts for -nonce faulty adversaries with . In the real world, if the underlying block cipher is instantiated with AES-128, then GCM-SIV1.5 achieves, at most, approximately 96-bit security for -nonce faulty adversaries with .
In order to better demonstrate the superiority of our design, we give a fair and thorough comparison between GCM-SIV1.5 and existing typical blockcipher-based AE schemes from the following aspects: the depended assumption (PRP means pseudorandom permutation, PRF means pseudorandom function, TPRP means tweakable PRP, and ICM means ideal cipher model), the number of the encryption keys (#Encryption keys), the number of the hash keys (#Hash keys), the number of the underlying primitive (block cipher) calls (#Primitive calls), the number of the hash calls (#Hash calls), the sizes of the authentication tag and nonce, security bound under the nonce-respecting scenario (NR security), security bound under the nonce misuse scenario (NM security), and graceful degradation. The details are shown in Table 1. Compared with GCM-SIV, GCM-SIV1, GCM-SIV2, and GCM-SIVr, GCM-SIV1.5 utilizes fewer keys, fewer blockcipher and hash calls, and shorter sizes, provides a better security bound, and supports graceful security degradation. Therefore, GCM-SIV1.5 reduces the costs of key management and communication throughput, increases the running speed, and ensures a graceful security. Compared with CWC+, GCM-SIV1.5 provides a better security bound and supports fully faulty nonce misuse resistance and graceful security degradation for both privacy and authenticity. Compared with SCM, GCM-SIV1.5 saves an encryption key, supports offline operations involving the nonce’s encryption, and saves half of the online computing resources. In a word, our design has an excellent comprehensive performance.
The rest of this paper is organized as follows. Section 2 presents some preliminaries. Section 3 introduces mirror theory and its graph description. Section 4 shows the decomposition of nAE security. Section 5 described GCM-SIVr. Section 6 proposes our construction, GCM-SIV1.5. Section 7 derives the security proof. Section 8 concludes this paper.
2. Preliminaries
Notations. Some notations are described in Table 2.
Nonce-Based Authenticated Encryption (nAE). A nonce-based authenticated encryption (nAE) with associated data scheme consists of an encryption algorithm and a decryption algorithm , where is a non-empty set of keys. Let . The encryption algorithm takes a key K, a nonce N, associated data A, and a message M as the input and outputs a ciphertext and an authentication tag . The decryption algorithm takes a key K, a nonce N, associated data A, a ciphertext C, and an authentication tag T as the input and outputs a message or a reject symbol . Here, .
An nAE adversary has access to encryption and decryption oracles or random and reject oracles , whose goal is to distinguish them. The random oracle $ takes as the input and always outputs random strings . The reject oracle ⊥ takes as the input and always outputs a reject symbol ⊥. The nAE advantage of against is defined as
We assume that makes q encryption queries to and returns , and then makes forgery attempts , to . For a nonce-based AE scheme, we call an AE query a faulty query if has already queried its oracle with the same nonce, and assume that can be allowed to make, at most, faulty queries. Then, ( are distinct) corresponds to the nonce-respecting setting and (there exists at least one collision in ) corresponds to the nonce misuse setting.
Nonce-Based Encryption (nE). A nonce-based encryption (nE) scheme consists of an encryption algorithm and a decryption algorithm . The encryption algorithm takes a key , a nonce N, associated data A, and a message M as the input and outputs a ciphertext . The decryption algorithm takes a key , a nonce N, associated data A, and a ciphertext C as the input and outputs a message . Here, .
An nE adversary has access to encryption oracle or a random oracle $, whose goal is to distinguish them. The random oracle $ takes as the input and always outputs random strings . We define the nE-advantage of as
Pseudo-Random Function (PRF). Let be a keyed function, where is a non-empty set of keys. It takes and as the input, and returns . Let .
A PRF adversary has access to encryption oracle or a random oracle R, whose goal is to distinguish them. The PRF advantage of an adversary is defined as
Pseudo-Random Permutation (PRP). Let be a block cipher, where is a non-empty set of keys. It takes a key and a plaintext block as the input, and returns a ciphertext block . For each key , the function is a permutation, i.e., . Let .
A PRP adversary has access to encryption oracle or a random permutation oracle P, whose goal is to distinguish them. The PRP advantage of an adversary is defined as
AXU Hash Functions [22,26,27,30]. Let be a hash function, where is a non-empty hash key space. Let L be a hash key randomly drawn from . If, for any distinct and , it holds that
then H is called almost XOR universal (-AXU). If , H is called an XOR universal (XU) hash function.Alternating Events Lemma [26,27,30]. For bounding the probability of an alternating event, such as
the alternating events lemma is a vital technique in the security proofs.(Alternating Events Lemma [26,27,30]). Let such that . Let be a q-tuple of random variables, and let . For distinct , let be events associated with and , possibly dependent, which all hold with a probability of, at most, ϵ. For distinct , let be events associated with and , which all hold with a probability of, at most, . Moreover, the collection of events is independent with the collection of event . Then, there exist such that
H-coefficient Technique [31]. Patarin’s H-coefficient technique is one of the very useful approaches to upper bound the distinguishing advantage of a cryptographic scheme. Given a real system X and an ideal system Y, let be a deterministic adversary whose goal is distinguish X from Y. interacts with X and Y and a series of query–response pairs are recorded as a transcript . Let be the set of all possible transcripts. Let be the random variable interacting with the real system X and be the random variable interacting with the ideal system Y. Then, the H-coefficient lemma is presented as follows.
(H-coefficient Lemma). Let and . If and for all , , then
If an adversary makes q queries to an oracle O and obtains a transcript ⋯, , then we say that the oracle O extends the transcript and write it as , i.e., if for all , then .
3. Mirror Theory
Patarin’s mirror theory is a vital tool for bounding the number of solutions of affine systems of multivariate equations or non-equations, which can be applied in the security proofs of BBB-secure cryptographic schemes [27,32,33,34,35]. Here, we consider an affine system of bi-variate equations.
Let be a bipartite graph satisfying the following affine system of bi-variate equations :
where for any i and j, and let the vertex sets , the edge set E, and the weighted (labeled) function W beWe assume that G can be divided into components with more than two vertexes and components with just two vertexes, i.e., .
For a bipartite graph G, we say that G is good if it satisfies the following conditions:
Acylic. G must contain no cycle.
Non-zero path label (NPL). for all paths with an even length in the graph G, where .
(Bipartite Graph Description of Mirror Theory [27,35]). Let be a good bipartite graph induced by , and . Let be the total edges of components with more than two vertexes. Then, the number of solutions to that are chosen from is at least
where4. Decomposition of nAE Security
Namprempre et al. explored the generic composition of nAE and revealed the decomposition of nAE (security) from IV-based or nonce-based encryption and an MAC [36]. Now, let us focus on N3 type nAE schemes.
An N3 type nAE scheme consists of a PRF and an nE scheme , where is the key space, is the encryption algorithm, and is the decryption algorithm. Given , takes as the input and returns . To be specific, first let , and then . takes as the input and returns . To be specific, first let and , and then return M if and ⊥ otherwise.
Type N3 nAE is secure if its tag generation function is a PRF and if the nE scheme is secure [36]. We assume that an adversary makes, at most, q encryption queries and forgery attempts; then, the security of is shown in the following lemma.
(Decomposition of nAE Security [36]). Let be a tag generation function and be an nE scheme, where . Let be an N3 type nAE scheme constructed by and . Let be an nAE-adversary. Then, there are two adversaries, and , such that
The above lemma shows that the security proofs of nAE schemes are reduced to the security proofs of the PRF and the nE scheme.
5. GCM-SIVr
Let us first review the specification of GCM-SIVr [12], where is an integer. It utilizes a block cipher and a hash function . The encryption algorithm of GCM-SIVr takes a key , , a nonce N, associated data A, and a plaintext M as the input, and returns a ciphertext C and an authentication tag , i.e., . The decryption algorithm of GCM-SIVr takes K, N, A, C, and T as the input, and returns . The details are shown in Algorithms 1–5. GCM-SIV1 and GCM-SIV2 are degraded versions of GCM-SIVr when and 2.
Algorithm 1 The key generation algorithm: |
Input: a key parameter k Output: a key return |
Algorithm 2 The encryption algorithm: |
Input: a key K, a nonce N, associated data A, and a plaintext M Output: a ciphertext C and a tag T Partition M into , for to r do
endfor for to r do for to r do
endfor endfor for to r do
endfor
return |
Algorithm 3 The decryption algorithm: |
Input: a key K, a nonce N, associated data A, a ciphertext C, and a tag T Output: a plaintext M or ⊥ Partition C into , for to r do
endfor
for to r do
endfor for to r do for to r do
endfor endfor
if, returnM else return ⊥ (INVALID) endif |
Algorithm 4 GHASH algorithm: |
Input: a key L, associated data A, and a plaintext M Output: a hash value h ,
,
for to x do
endfor return h |
Algorithm 5 CTR algorithm: |
Input: a key K, an initial vector T, and the number of plaintext blocks m Output: a key stream S
for to m do
endfor return |
6. GCM-SIV1.5
6.1. Specific Description of GCM-SIV1.5
Both GCM-SIV1 and GCM-SIV2 are nonce-based authenticated encryption with associated data modes by combining a PRF and an ivE scheme. GCM-SIV1 enjoys birthday-bound security up to almost adversarial queries by using an n-bit authentication tag. GCM-SIV2 utilizes two instances of GCM-SIV1 to achieve beyond-birthday-bound (BBB) security by increasing the number of keys, authentication tags, and block ciphers. However, these methods greatly affect the implementation cost and operation efficiency of cryptographic algorithms. In real life, cryptographic algorithms that provide BBB security, as low as possible hardware and software implementation costs, and high enough operational efficiencies are much more desirable.
Given an -AXU-hash function and a block cipher , where and are two non-empty sets of keys, and n is the block-size, we construct a new two-pass parallelizable nAE mode, GCM-SIV1.5. GCM-SIV1.5 is an optimal tradeoff between GCM-SIV1 and GCM-SIV2 for supporting BBB security with graceful degradation, as low as possible hardware and software implementation costs, and high enough operational efficiencies in nonce-faulty settings. We introduce a sum of permutation (SoP) construction to encryption and authentication parts of GCM-SIV1.5, which makes GCM-SIV1.5 BBB-secure. The authentication part of GCM-SIV1.5 is generated by , which ensures BBB security. The encryption part of GCM-SIV1.5 is generated by with an initial vector and a nonce, which ensures BBB security.
The overview of GCM-SIV1.5 is illustrated in Figure 1.
GCM-SIV1.5 consists of a key generation algorithm , an encryption algorithm , and a decryption algorithm . The key generation algorithm takes a key parameter k as the input and returns a key (two encryption keys and a hash key L) from an entropy pool of a set of keys . The encryption algorithm takes a key , a nonce N, associated data A, and a plaintext M as the input, invokes the tag generation algorithm and CTR with the SoP algorithm , and outputs the corresponding ciphertext and authentication tag . The decryption algorithm takes a key , a nonce N, associated data A, a ciphertext C, and an authentication tag T as the input, invokes the tag generation algorithm and CTR with the SoP algorithm , and outputs the corresponding plaintext M or a reject symbol ⊥, i.e., . The key generation, encryption, and decryption algorithms are described in Algorithms 6–8. The tag generation algorithm and CTR with the SoP algorithm are described in Algorithms 9 and 10.
Algorithm 6 The key generation algorithm: |
Input: a key parameter k Output: a key return |
Algorithm 7 The encryption algorithm: |
Input: a key , a nonce N, associated data A, and a plaintext M Output: a ciphertext C and a tag T Partition M into ,
return |
Algorithm 8 The decryption algorithm: |
Input: a key , a nonce N, associated data A, a ciphertext C, and a tag T Output: a plaintext M or ⊥ Partition C into ,
if, returnM else return⊥ (INVALID) endif |
Algorithm 9 The tag generation algorithm: |
Input: a key , a nonce N, associated data A, and a plaintext M Output: a tag T
return T |
Algorithm 10 CTR with SoP algorithm: |
Input: a key , a nonce N, an initial vector T, and the number of plaintext blocks m Output: a key stream S for
endfor return |
6.2. Security of GCM-SIV1.5
We present the information-theoretic security of GCM-SIV1.5 under the assumption that the underlying block cipher is a secure pseudorandom permutation.
GCM-SIV1.5 is an N3 type nAE scheme (and it can also be seen as an A7 type nAE scheme); therefore, it can be decomposed into a PRF and an nE scheme , where , , , and .
takes a key , a nonce , associated data , and a message as the input and returns an authentication tag . takes the key , the nonce , the authentication tag , and the message as the input, computes a key-stream , and then encrypts M to return the corresponding ciphertext .
According to Lemma 4, the nAE security of GCM-SIV1.5 can be decomposed into the PRF security of and the nE security of . Therefore, we have the following lemmas.
Let be an μ-fault adversary and be ϵ-AXU. Let . If makes at most queries, then there exist adversaries and with the same query complexity against the block cipher E such that
Let be an μ-fault adversary that makes at most queries and generates at most σ blocks, and let and m be the maximum block of the plaintext; then, there exist adversaries and with the same query complexity against the block cipher E such that
The security proof of Lemma 5 is the same as that of Theorem 4 in the study by Chen et al. [27]. The security proof of Lemma 6 is shown in Section 7.
By combining Lemmas 4–6, we present the security of GCM-SIV1.5 as follows.
Let be an μ-fault adversary and be ϵ-AXU. Let and m be the maximum block of the plaintext. If makes at most queries and generates at most σ blocks, then there exist adversaries and with the same query complexity against the block cipher E such that
Theorem 1 shows that, if the underlying block cipher E is a secure PRP and , GCM-SIV1.5 offers BBB nAE security up to approximately -bit query complexity and approximately n-bit forgery attempts for -nonce faulty adversaries with .
7. Proofs of Lemma 6
The proof is similar to that of Theorem 4 in Chen et al. [27]. Let . The adversary makes q encryption queries to the real world or the ideal world R (R is an ideal version of and always random strings) and returns , and then encrypts plaintexts to obtain ciphertexts . First, we replace and with two independent random permutations and , and the replacements cost us , where and are PRP adversaries against the underlying block cipher. Then, we consider . Let . Let be the random variable interacting with the real world and be the random variable interacting with the ideal world .
For the real world, the transcript with q queries corresponds to the following mirror system of bi-variate equations:
As are two independent random permutations, let , , and , where . Let .Let be the set of vertices , be the set of vertices , , and . The above mirror system with a transcript can be described as an undirected weighted bipartite graph . As T is random, there exist collisions in for any . Let m be the maximum block of the plaintext. According to the fact that the nonce is -fault, is -fault.
In order to utilize the mirror theory, we first define a bad transcript.
(Bad Transcript). A transcript τ is called bad if one of the following events occurs:
covers a circle of length 2 or a path of length 2 such that the weight of this path is zero.
–. B1: There exist distinct such that and , where , i.e., and (it implies ).
B2: There exist distinct such that and , where , i.e., and .
B3: There exist distinct such that and , where , i.e., (it implies ) and .
covers a path of length 4 starting at the Y-shore, or a path of length 4 starting at the X-shore such that the weight of this path is zero (this condition satisfies the fact that covers a circle of length 4 or a path of length 4 such that the weight of this path is zero).
–. B4: There exist distinct such that , , and , i.e., , , and (it implies ).
B5: There exist distinct such that , , , and , i.e., , , , and (it implies ).
The number of edges in components with a size of more than 2 is . Each vertex in the components is associated with two edges in the average case. Let us assume that it may be evenly amortized to the two vertex sets of the bipartite graph.
–. B6: , i.e, .
B7: , i.e, .
Let be bad transcripts, Γ be all attainable transcripts, and .
Next, we upper bound the probability of bad transcripts in the ideal world .
For B1, the probability that occurs for any fixed is , and the number of pairs such that is at most , where ; then, we have
For B2, the probability that occurs for any fixed is , and the probability that occurs for any fixed is ; then, we have
For B3, the probability that occurs for any fixed is , and the number of pairs such that is at most , where ; then, we have
For B4, the probability that occurs for any fixed is and the number of pairs such that and for any fixed is at most (as the number of queries using any repeated nonce is at most ); then, we have
For B5, let , the probability that occurs for any fixed be (the same for ), and the probability that occurs for any fixed be . According to alternating event lemma and , we have
For B6, according to Markov’s inequality, the probability of B6 is upper bounded by
In order to obtain -bit security, we choose . Then,
For B7, as , the probability of B7 being upper bounded by
To summarize, the probability of bad transcripts is
Then, we consider the ratio between the real world X and the ideal world Y in the good transcript. In the good transcript, meets (1) acyclic, (2) NPL, and (3) . Let and ; according to the mirror theory, the number of solutions is at least , where
In the real world X, we have
In the ideal world Y, we have
Therefore, the ratio between and is
According to the H-coefficient technique, we have
So far, we have completed the proof of Lemma 6.
8. Discussions and Conclusions
GCM-SIV1.5 is one of the favored generic nAE constructions described in [36], which combines a PRF and an nE or ivE scheme . Here, the PRF is a BBB-secure scheme and the nE scheme is a BBB-secure scheme.
GCM-SIV1.5 offers an optimal tradeoff to GCM-SIV1 and GCM-SIV2 for supporting BBB security, as low as possible implementation costs, and high enough operational efficiencies. From the perspective of the security strength, if the underlying block cipher E is a secure PRP and , GCM-SIV1.5 offers approximately -bit nAE security for -fault nonce-misusing adversaries and supports graceful security degradation, which is better than those of GCM-SIV1 and GCM-SIV2. From the perspective of implementation costs, compared with GCM-SIV2 and GCM-SIVr, GCM-SIV1.5 utilizes fewer keys (just two block cipher keys and a hash key) and lower storage and communication costs or throughput (just n-bit authentication tag). From the perspective of operational efficiencies, GCM-SIV1.5 utilizes just a hash function call and two plaintext blocks calls. More importantly, all encryption operations involving the nonce can be carried out offline, which saves half of the online computing resources. To sum up, our design achieves the optimal tradeoff to GCM-SIV and GCM-SIVr from the security strength, implementation costs, and software performance aspects.
In order to further demonstrate the superiority of our design, Table 1 shows a fair and thorough comparison between GCM-SIV1.5 and other similar schemes. Compared with CWC+, GCM-SIV1.5 provides a better security bound and supports fully faulty nonce misuse resistance, but the number of the encryption keys and the number of the block cipher calls are slightly inferior. Compared with SCM, GCM-SIV1.5 saves an encryption key, supports offline operations involving the nonce’s encryption, and saves half of the online computing resources, but other aspects, such as the number of block cipher calls, nonce size, and security bound, are slightly inferior. Besides that, SCM utilizes the finite field multiplication operations in the encryption part, although these multiplication operations can be quickly calculated using the double point technique. However, our design just utilizes some XOR and finite field addition operations.
GCM-SIV1.5 utilizes three keys. A natural future direction is to reduce the number of keys and to obtain a single-key BBB-secure variant. Besides that, GCM-SIV1.5 utilizes two plaintext blocks calls. Another future direction is to decrease the invocations of block ciphers and to improve the operational efficiencies. Our security is based on the condition that . We leave considering the case of as an open problem.
Not applicable.
The data used to support the findings of the study are available within the article.
We would like to express our sincere thanks to editors and the anonymous reviewers for the valuable comments and suggestions.
The author declares no conflict of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Comparison between GCM-SIV1.5 and existing typical nonce-based AE schemes, where PRP means pseudorandom permutation, PRF means pseudorandom function, TPRP means tweakable PRP, ICM means ideal cipher model, # means counting, m is blocks of the plaintext, a is blocks of associated data, and n is the block-size of the underlying primitive.
Assumption | #Encryption Keys | #Hash Keys | #Primitive Calls | #Hash Calls | |
---|---|---|---|---|---|
GCM [ |
PRP | 1 | 1 |
|
1 |
ELmD [ |
PRP | 1 | 0 |
|
0 |
OCB3 [ |
PRP | 1 | 1 |
|
1 |
TPRP | 1 | 1 |
|
1 |
|
mGCM [ |
PRP | 1 | 1 |
|
1 |
GCM-SIV [ |
PRF | 2 | 1 |
|
1 |
AES-GCM-SIV [ |
ICM | 1 |
1 |
|
1 |
GCM-SIV1 [ |
PRP | 2 | 1 |
|
1 |
GCM-SIV2 [ |
PRP | 6 | 2 |
|
2 |
GCM-SIVr [ |
PRP |
|
r |
|
r |
CWC+ [ |
PRP | 1 | 1 |
|
1 |
SCM [ |
PRP | 3 | 1 |
|
1 |
GCM-SIV1.5 | PRP | 2 | 1 |
|
1 |
Tag Size | Nonce Size | NR Security | NM Security | Graceful Degradation | |
GCM [ |
≤n |
|
|
- | × |
ELmD [ |
n | n |
|
|
× |
OCB3 [ |
≤n | ≤n |
|
- | × |
≤n | ≤n |
|
- | × | |
mGCM [ |
n | n |
|
- | × |
GCM-SIV [ |
n | n |
|
|
× |
AES-GCM-SIV [ |
n |
|
|
|
✔ |
GCM-SIV1 [ |
n | n |
|
|
× |
GCM-SIV2 [ |
|
n |
|
|
× |
GCM-SIVr [ |
|
n |
|
|
× |
CWC+ [ |
≤n |
|
|
|
✔ |
SCM [ |
n |
|
|
|
✔ |
GCM-SIV1.5 | n |
|
|
|
✔ |
1 The hash key is the encryption key. 2 The hash function is achieved by invoking a underlying primitives. 3 The encryption key is generated by invoking a key derivation function. 4 The hash key is generated by invoking a key derivation function. 5 The hash key is generated by the encryption key. 6 This security bound is just that of authenticity. The privacy of CWC+ is insecure in the nonce misuse setting.
Descriptions of notations.
Notations | Descriptions |
---|---|
⊕ | the bitwise exclusive or (XOR) |
+ | addition modulo |
· | the multiplication over the finite field |
|
the concatenation of strings |
|
a set of all strings (including an empty string) |
|
a set of all strings whose bit-length is n |
|
a set of all permutations whose workspace is n |
|
a set of all functions from m-bit inputs to n-bit outputs |
|
the key K randomly sampled from the key space |
|
an event where an adversary |
|
an m-bit binary representation of an integer i |
|
a set of consecutive integers |
|
the number of elements in the set X |
|
|
References
1. McGrew, D.A.; Viega, J. The security and performance of the Galois/Counter Mode (GCM) of operation. Progress in Cryptology— INDOCRYPT 2004; Canteaut, A.; Viswanathan, K. Springer: Berlin/Heidelberg, Germany, 2004; pp. 343-355.
2. Joux, A. Authentication Failures in NIST Version of GCM. Public Comments to NIST. Available online: https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/joux_comments.pdf (accessed on 17 September 2022).
3. Iwata, T.; Ohashi, K.; Minematsu, K. Breaking and repairing GCM security proofs. Advances in Cryptology—CRYPTO 2012; Safavi-Naini, R.; Canetti, R. Springer: Berlin/Heidelberg, Germany, 2012; pp. 31-49.
4. Aoki, K.; Yasuda, K. The security and performance of GCM when short multiplications are used instead. Advances in Cryptology—Inscrypt 2012; Kutylowski, M.; Yung, M. Springer: Berlin/Heidelberg, Germany, 2012; pp. 225-245.
5. Niwa, Y.; Ohashi, K.; Minematsu, K.; Iwata, T. GCM security bounds reconsidered. Advances in Cryptology—FSE 2015; Leander, G. Springer: Berlin/Heidelberg, Germany, 2015; pp. 385-407.
6. Bellare, M.; Tackmann, B. The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. Advances in Cryptology—CRYPTO 2016; Robshaw, M.; Katz, J. Springer: Berlin/Heidelberg, Germany, 2016; pp. 247-276.
7. Ashur, T.; Dunkelman, O.; Luykx, A. Boosting authenticated encryption robustness with minimal modifications. Advances in Cryptology—CRYPTO 2017; Katz, J.; Shacham, H. Springer: Berlin/Heidelberg, Germany, 2017; pp. 3-33.
8. Zhang, P.; Hu, H.; Yuan, Q. Close to optimally secure variants of GCM. Secur. Commun. Netw.; 2018; 2018, pp. 9715947:1-9715947:12. [DOI: https://dx.doi.org/10.1155/2018/9715947]
9. Hoang, V.T.; Tessaro, S.; Thiruvengadam, A. The multi-user security of GCM, revisited: Tight bounds for nonce randomization. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security—CCS 2018; Toronto, ON, Canada, 15–19 October 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 1429-1440.
10. Sovyn, Y.; Khoma, V.; Podpora, M. Comparison of three CPU-core families for IoT applications in terms of security and performance of AES-GCM. IEEE Internet Things J.; 2020; 7, pp. 339-348. [DOI: https://dx.doi.org/10.1109/JIOT.2019.2953230]
11. Gueron, S.; Lindell, Y. GCM-SIV: Full nonce misuse-resistant authenticated encryption at under one cycle per byte. Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security—CCS 2015; Denver, CO, USA, 12–16 October 2015; Association for Computing Machinery: New York, NY, USA, 2015; pp. 109-119.
12. Iwata, T.; Minematsu, K. Stronger security variants of GCM-SIV. IACR Trans. Symmetric Cryptol.; 2016; 2016, pp. 134-157. [DOI: https://dx.doi.org/10.46586/tosc.v2016.i1.134-157]
13. Gueron, S.; Langley, A.; Lindell, Y. AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption; RFC 8452 Crypto Forum Research Group: Stamford, CT, USA, 2019; pp. 1-42.
14. Iwata, T.; Seurin, Y. Reconsidering the security bound of AES-GCM-SIV. IACR Trans. Symmetric Cryptol.; 2017; 2017, pp. 240-267. [DOI: https://dx.doi.org/10.46586/tosc.v2017.i4.240-267]
15. Gueron, S.; Lindell, Y. Better bounds for block cipher modes of operation via nonce-based key derivation. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security—CCS 2017; Dallas, TX, USA, 30 October–3 November 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 1019-1036.
16. Bose, P.; Hoang, V.T.; Tessaro, S. Revisiting AES-GCM-SIV: Multi-user security, faster key derivation, and better bounds. Advances in Cryptology—EUROCRYPT 2018; Nielsen, J.B.; Rijmen, V. Springer: Berlin/Heidelberg, Germany, 2018; pp. 468-499.
17. Rogaway, P.; Shrimpton, T. A provable-security treatment of the key-wrap problem. Advances in Cryptology—EUROCRYPT 2006; Vaudenay, S. Springer: Berlin/Heidelberg, Germany, 2006; pp. 373-390.
18. Andreeva, E.; Bogdanov, A.; Luykx, A.; Mennink, B.; Tischhauser, E.; Yasuda, K. Parallelizable and authenticated online ciphers. Advances in Cryptology—ASIACRYPT 2013; Sako, K.; Sarkar, P. Springer: Berlin/Heidelberg, Germany, 2013; pp. 424-443.
19. Bossuet, L.; Datta, N.; Mancillas-Lopez, C.; Nandi, M. ELmD: A pipelineable authenticated encryption and its hardware implementation. IEEE Trans. Comput.; 2016; 65, pp. 3318-3331. [DOI: https://dx.doi.org/10.1109/TC.2016.2529618]
20. Peyrin, T.; Seurin, Y. Counter-in-Tweak: Authenticated encryption modes for tweakable block ciphers. Advances in Cryptology—CRYPTO 2016; Robshaw, M.; Katz, J. Springer: Berlin/Heidelberg, Germany, 2016; pp. 33-63.
21. Iwata, T.; Minematsu, K.; Peyrin, T.; Seurin, Y. ZMAC: A fast tweakable block cipher mode for highly secure message authentication. Advances in Cryptology—CRYPTO 2017; Katz, J.; Shacham, H. Springer: Berlin/Heidelberg, Germany, 2017; pp. 34-65.
22. Choi, W.; Lee, B.; Lee, J.; Lee, Y. Toward a fully secure authenticated encryption scheme from a pseudorandom permutation. Advances in Cryptology—ASIACRYPT 2021; Tibouchi, M.; Wang, H. Springer: Berlin/Heidelberg, Germany, 2021; pp. 407-434.
23. Dutta, A.; Nandi, M.; Talnikar, S. Beyond birthday bound secure MAC in faulty nonce model. Advances in Cryptology—EUROCRYPT 2019; Ishai, Y.; Rijmen, V. Springer: Berlin/Heidelberg, Germany, 2019; pp. 437-466.
24. Iwata, T. New blockcipher modes of operation with beyond the birthday bound security. Advances in Cryptology—FSE 2006; Robshaw, M. Springer: Berlin/Heidelberg, Germany, 2006; pp. 310-327.
25. Naito, Y.; Sasaki, Y.; Sugawara, T. Lightweight authenticated encryption mode suitable for threshold implementation. Advances in Cryptology—EUROCRYPT 2020; Canteaut, A.; Ishai, Y. Springer: Berlin/Heidelberg, Germany, 2020; pp. 705-735.
26. Choi, W.; Lee, B.; Lee, Y.; Lee, J. Improved security analysis for nonce-based enhanced hash-then-mask MACs. Advances in Cryptology—ASIACRYPT 2020; Moriai, S.; Wang, H. Springer: Berlin/Heidelberg, Germany, 2020; pp. 697-723.
27. Chen, Y.L.; Mennink, B.; Preneel, B. Categorization of faulty nonce misuse resistant message authentication. Advances in Cryptology—ASIACRYPT 2021; Tibouchi, M.; Wang, H. Springer: Berlin/Heidelberg, Germany, 2021; pp. 520-550.
28. Krovetz, T.; Rogaway, P. The software performance of authenticated encryption modes. Advances in Cryptology—FSE 2011; Joux, A. Springer: Berlin/Heidelberg, Germany, 2011; pp. 306-327.
29. Bhattacharya, S.; Nandi, M. Revisiting variable output length XOR pseudorandom function. IACR Trans. Symmetric Cryptol.; 2018; 2018, pp. 314-335. [DOI: https://dx.doi.org/10.46586/tosc.v2018.i1.314-335]
30. Jha, A.; Nandi, M. Tight security of cascaded LRW2. J. Cryptol.; 2020; 33, pp. 1272-1317. [DOI: https://dx.doi.org/10.1007/s00145-020-09347-y]
31. Patarin, J. The “coefficients H” technique. Selected Areas in Cryptography—SAC 2008; Avanzi, R.M.; Keliher, L.; Sica, F. Springer: Berlin/Heidelberg, Germany, 2008; pp. 328-345.
32. Patarin, J. Mirror theory and cryptography. Appl. Algebra Eng. Commun. Comput.; 2017; 28, pp. 321-338. [DOI: https://dx.doi.org/10.1007/s00200-017-0326-y]
33. Nachef, V.; Patarin, J.; Volte, E. Introduction to mirror theory. Feistel Ciphers; Springer: Berlin/Heidelberg, Germany, 2017; pp. 203-221.
34. Patarin, J. Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography. Available online: http://eprint.iacr.org/2010/287 (accessed on 17 September 2022).
35. Kim, S.; Lee, B.; Lee, J. Tight security bounds for double-block hash-then-sum MACs. Advances in Cryptology—EUROCRYPT 2020; Canteaut, A.; Ishai, Y. Springer: Berlin/Heidelberg, Germany, 2020; pp. 435-465.
36. Namprempre, C.; Rogaway, P.; Shrimpton, T. Reconsidering generic composition. Advances in Cryptology—EUROCRYPT 2014; Nguyen, P.Q.; Oswald, E. Springer: Berlin/Heidelberg, Germany, 2014; pp. 257-274.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
GCM-SIV2 is a nonce-based beyond-birthday-bound (BBB)-secure authenticated encryption (AE) mode introduced by Iwata and Minematsu at FSE 2017. However, it is built by combining two instances of GCM-SIV1 and needs eight keys, which increases the costs of hardware and software implementation. This paper aims to reduce these costs by optimizing components (such as key materials, hash calls, and block cipher calls) and proposes an optimal tradeoff between GCM-SIV1 and GCM-SIV2 called GCM-SIV1.5. Moreover, we introduce the faulty nonce setting to AE and prove the BBB security of GCM-SIV1.5 with graceful security degradation in the faulty nonce setting by mirror theory. Finally, we discuss advantages of GCM-SIV1.5.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer