Top Banner
Pipelineable On-Line Encryption with Tag (POET) Farzaneh Abed 2 Scott Fluhrer 1 John Foley 1 Christian Forler 2 Eik List 2 Stefan Lucks 2 David McGrew 1 Jakob Wenzel 2 1 Cisco Systems, 2 Bauhaus-Universität Weimar DIAC 2014 Santa Barbara, CA Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 1
62

Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Feb 20, 2019

Download

Documents

vothuan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Pipelineable On-Line Encryption with Tag (POET)

Farzaneh Abed2 Scott Fluhrer1 John Foley1

Christian Forler2 Eik List2 Stefan Lucks2 David McGrew1

Jakob Wenzel2

1 Cisco Systems, 2 Bauhaus-Universität Weimar

DIAC 2014

Santa Barbara, CA

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 1

Page 2: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Outline

1 Motivation

Case Study: OTN

Decryption Misuse

2 CAESAR Submission POET

3 Security of POET

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 2

Page 3: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation

Section 1

Motivation

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 3

Page 4: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Case Study: OTN

Case Study: Optical Transport Network (OTN)

Task:

Secure network traffic . . .

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 4

Page 5: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Case Study: OTN

Case Study: Optical Transport Network (OTN)

Task:

Secure network traffic . . .

. . . of real-time applications . . .

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 4

Page 6: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Case Study: OTN

Case Study: Optical Transport Network (OTN)

Task:

Secure network traffic . . .

. . . of real-time applications . . .

. . . in an Optical Transport Network (OTN)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 4

Page 7: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Case Study: OTN

Case Study: Optical Transport Network (OTN)

Task:

Secure network traffic . . .

. . . of real-time applications . . .

. . . in an Optical Transport Network (OTN)

High throughput (40 - 100 Gbit/s)

Low latency (few clock cycles)

Large message frames (64 KB)

(usually consist of multiple TCP/IP or UDP/IP packages)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 4

Page 8: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Case Study: OTN

Requirements for OTNs

Security requirements:

Data privacy (IND-CPA), and

Data integrity (INT-CTXT)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 5

Page 9: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Case Study: OTN

Requirements for OTNs

Security requirements:

Data privacy (IND-CPA), and

Data integrity (INT-CTXT)

Functional requirements:

On-line encryption/decryption

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 5

Page 10: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Case Study: OTN

Problem and Workarounds

Problem: High Latency of Authenticated Decryption

1 Decryption of the entire message

2 Verification of the authentication tag

For 64-kB frames we have 4,096 ciphertext blocks (128 bits)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 6

Page 11: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Case Study: OTN

Problem and Workarounds

Problem: High Latency of Authenticated Decryption

1 Decryption of the entire message

2 Verification of the authentication tag

For 64-kB frames we have 4,096 ciphertext blocks (128 bits)

Workarounds:

Decrypt-then-mask? [Fouque et al. 03]⇒ latency again

Pass plaintext beforehand and hope. . .

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 6

Page 12: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Case Study: OTN

Problem and Workarounds

Problem: High Latency of Authenticated Decryption

1 Decryption of the entire message

2 Verification of the authentication tag

For 64-kB frames we have 4,096 ciphertext blocks (128 bits)

Workarounds:

Decrypt-then-mask? [Fouque et al. 03]⇒ latency again

Pass plaintext beforehand and hope. . .

Drawbacks:

Plaintext information would leak if authentication tag invalid

Literature calls this setting decryption-misuse

[Fleischmann, Forler, and Lucks 12]

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 6

Page 13: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

How Severe is Decryption-Misuse?

Puts security at high risk

CCA-adversary may inject controlled manipulations

Particularly, CTR-mode based AE schemes

C ⊕∆→Dec M ⊕∆

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 7

Page 14: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

How Severe is Decryption-Misuse?

Puts security at high risk

CCA-adversary may inject controlled manipulations

Particularly, CTR-mode based AE schemes

C ⊕∆→Dec M ⊕∆

Decryption-misuse is not covered by existing CCA3-security proofs

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 7

Page 15: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

Decryption Misuse Resistance

Best to wish for:

Manipulation of ciphertext block Ci

⇒ completely random plaintext

Contradiction to on-line requirement

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 8

Page 16: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

Decryption Misuse Resistance

Best to wish for:

Manipulation of ciphertext block Ci

⇒ completely random plaintext

Contradiction to on-line requirement

What can we achive with an on-line encryption scheme?

Manipulation of Ci ⇒ Mi ,Mi+1, . . . random garbage

Adversary sees at best common message prefixes

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 8

Page 17: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

Decryption Misuse Resistance

Best to wish for:

Manipulation of ciphertext block Ci

⇒ completely random plaintext

Contradiction to on-line requirement

What can we achive with an on-line encryption scheme?

Manipulation of Ci ⇒ Mi ,Mi+1, . . . random garbage

Adversary sees at best common message prefixes

The security notion of OPRP-CCA covers this behaviour

[Bellare et al. 01]

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 8

Page 18: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

On-Line Permutation

P1 P2 P3 P4 P5

P1 P2 P'3 P4 P5

C1 C2

C3 C4 C5

C'3 C'4 C'5

Encrypt

Encrypt

On-Line Pseudo Random Permutation (OPRP)

Like a PRP with the following property:

Plaintexts with common prefix→ ciphertexts with common prefix

(Bellare et al.; “Online Ciphers and the Hash-CBC Construction”; CRYPTO’01)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 9

Page 19: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

OPRP-CCA

Definition (OPRP-CCA Advantage)

Let P be a random on-line permutation, Π = (K ,E ,D) an on-line

encryption scheme, k$← K (), and A be an adversary. Then we

have

AdvOPRP-CCAΠ (A) =

∣Pr

[

AEk (.),Dk (.) =⇒ 1]

−[

AP(.),P−1(.) =⇒ 1]∣

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 10

Page 20: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

Intermediate (Authentication) Tags

Assume an OPRP-CCA secure encryption scheme

Recap: Modifying Ci =⇒ Mi ,Mi+1, . . . ,MM random garbage

Redundancy in the plaintext (e.g., checksum)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 11

Page 21: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

Intermediate (Authentication) Tags

Assume an OPRP-CCA secure encryption scheme

Recap: Modifying Ci =⇒ Mi ,Mi+1, . . . ,MM random garbage

Redundancy in the plaintext (e.g., checksum)

=⇒ intermediate authentication tags

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 11

Page 22: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Motivation Decryption Misuse

Intermediate (Authentication) Tags

Assume an OPRP-CCA secure encryption scheme

Recap: Modifying Ci =⇒ Mi ,Mi+1, . . . ,MM random garbage

Redundancy in the plaintext (e.g., checksum)

=⇒ intermediate authentication tags

Common network packets (TCP/IP, UDP/IP) have a checksum

=⇒ OTN: 16-bit integrity for free (per packet)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 11

Page 23: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Section 2

CAESAR Submission POET

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 12

Page 24: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Pipeline On-Line Encryption (POE)

...E EE

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1

FK1

FK2FK2

FK2

M1 M2 Mb−1

C1 C2 Cb−1

POE is a OPRP-CCA secure enc scheme [Abed et al. 14]

Actually, it provides birthday bound security

POE is used to process a message or ciphertext

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 13

Page 25: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

POET Header Processing

......

E

EE

EE K

KK

K K

H1 H2 Ha−1 Ha Ha||10∗

ττ

L 2L 2a−2L 2a−23L 2a−25L

We just borrowed the PMAC design [Black & Rogaway 02]

Nonce is (part of) the header

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 14

Page 26: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

POET

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

Well pipelineable

1 BC + 2 AXU hash-function (F ) calls per block

Borrows tag-splitting procedure from McOE

Robust against nonce- and decryption-misuse

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 15

Page 27: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Requirements for F

Basic Assumption (F is AXU)

F : {0, 1}k × {0, 1}n → {0, 1}n is ǫ-AXU

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 16

Page 28: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Requirements for F

Basic Assumption (F is AXU)

F : {0, 1}k × {0, 1}n → {0, 1}n is ǫ-AXU

Further Assumption (Cascade F b is AXU)

F bκ (X ) := Fκ(. . . (Fκ(X1)⊕ X2), . . .)⊕ Xb) is b · ǫ-AXU

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 16

Page 29: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Requirements for F

Basic Assumption (F is AXU)

F : {0, 1}k × {0, 1}n → {0, 1}n is ǫ-AXU

Further Assumption (Cascade F b is AXU)

F bκ (X ) := Fκ(. . . (Fκ(X1)⊕ X2), . . .)⊕ Xb) is b · ǫ-AXU

Thanks to Mridul Nandi for pointing out this implicit assumption for

F in our inital version

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 16

Page 30: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Requirements for F

Basic Assumption (F is AXU)

F : {0, 1}k × {0, 1}n → {0, 1}n is ǫ-AXU

Further Assumption (Cascade F b is AXU)

F bκ (X ) := Fκ(. . . (Fκ(X1)⊕ X2), . . .)⊕ Xb) is b · ǫ-AXU

Thanks to Mridul Nandi for pointing out this implicit assumption for

F in our inital version

Nandi will give your more details about this in the next talk :-)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 16

Page 31: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Recommended Instantiations of F

Primary Recommendation: 4-Round-AES

10 + 4 + 4 = 18 AES rounds/block

ǫ-AXU with ǫ ≈ 2−113 [Daemen et al. 09]

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17

Page 32: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Recommended Instantiations of F

Primary Recommendation: 4-Round-AES

10 + 4 + 4 = 18 AES rounds/block

ǫ-AXU with ǫ ≈ 2−113 [Daemen et al. 09]

Secondary Recommendation: 10-Round-AES (Full-AES)

3 · 10 = 30 AES rounds/block

Full AES should be 2−128-AXU

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17

Page 33: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Recommended Instantiations of F

Primary Recommendation: 4-Round-AES

10 + 4 + 4 = 18 AES rounds/block

ǫ-AXU with ǫ ≈ 2−113 [Daemen et al. 09]

Secondary Recommendation: 10-Round-AES (Full-AES)

3 · 10 = 30 AES rounds/block

Full AES should be 2−128-AXU

Withdrawn Recommendation: GF-128 multiplication

Reason: Weak-Key Analysis of POET

Abdelraheem, Bogdanov and Tischhauser applied the

observations of Cid and Procter [CidP13] to POET

https://eprint.iacr.org/2014/226

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17

Page 34: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Software Performance

Software performance with Full-AES [Bogdanov et al. 14]

Single message scenario: 4.62 cpb

Multi message scenario: 2.75 cpb

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 18

Page 35: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Software Performance

Software performance with Full-AES [Bogdanov et al. 14]

Single message scenario: 4.62 cpb

Multi message scenario: 2.75 cpb

Estimated software performance with 4-AES

Single message scenario: (18/30) · 4.62 cpb ≈ 2.77 cpb

Multi message scenario: (18/30) · 2.75 cpb = 1.65 cpb

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 18

Page 36: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

CAESAR Submission POET

Software Performance

Software performance with Full-AES [Bogdanov et al. 14]

Single message scenario: 4.62 cpb

Multi message scenario: 2.75 cpb

Estimated software performance with 4-AES

Single message scenario: (18/30) · 4.62 cpb ≈ 2.77 cpb

Multi message scenario: (18/30) · 2.75 cpb = 1.65 cpb

We are looking for developers for high speed implementations

(https://github.com/cforler/poet)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 18

Page 37: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

Section 3

Security of POET

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 19

Page 38: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

Birthday bound security

POET is CCA3 secure against nonce-respecting adversaries

AdvCCA3Π (q, ℓ, t) ≤ AdvIND-CPA

Π (q, ℓ, t ′)+AdvINT-CTXTΠ (q, ℓ, t ′′) (∗)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 20

Page 39: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

Birthday bound security

POET is CCA3 secure against nonce-respecting adversaries

AdvCCA3Π (q, ℓ, t) ≤ AdvIND-CCA

Π (q, ℓ, t ′)+AdvINT-CTXTΠ (q, ℓ, t ′′) (∗)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 20

Page 40: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

Birthday bound security

POET is CCA3 secure against nonce-respecting adversaries

AdvCCA3Π (q, ℓ, t) ≤ AdvIND-CCA

Π (q, ℓ, t ′)+AdvINT-CTXTΠ (q, ℓ, t ′′) (∗)

POET is OCCA3 secure against nonce-ignoring adversaries

AdvOCCA3Π (q, ℓ, t) ≤ AdvOPRP-CCA

Π (q, ℓ, t ′)+AdvINT-CTXTΠ (q, ℓ, t ′′) (∗)

(∗)t ′, t ′′ ∈ O(t)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 20

Page 41: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 42: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 43: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

2. Header collison (Pr[COLLad ])

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 44: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

2. Header collison (Pr[COLLad ])3. Top row collison (Pr[COLLtop])

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 45: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

2. Header collison (Pr[COLLad ])3. Top row collison (Pr[COLLtop])4. Bottom row collison (Pr[COLLbot ])

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 46: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

A instantly wins if a bad event occurs

1. A can distinguish E from random permutation

2. Header collison (Pr[COLLad ])3. Top row collison (Pr[COLLtop])4. Bottom row collison (Pr[COLLbot ])

A can distinguish POET without a collison (Pr[NOCOLL])

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 21

Page 47: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 48: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 49: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 50: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 51: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫ

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 52: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫCollision between non final mesage blocks: ≤ ℓ2ǫ/2

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 53: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫCollision between non final mesage blocks: ≤ ℓ2ǫ/2

4. Collision in bottom row (see 3.)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 54: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫCollision between non final mesage blocks: ≤ ℓ2ǫ/2

4. Collision in bottom row (see 3.)

Pr[NOCOLL] can be upper bound by 9 · ℓ2/(2n − 3ℓ)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 55: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: OPRP-CCA-Security

Upper bounds for the four bad events

1. Assume E is secure: AdvIND-SPRPE,E−1 (ℓ+ 2q,O(t))

2. Upper bound for header collison: ℓ2/2n

3. Top row collision implies either

Collision with a final message block: ≈ ℓ2ǫCollision between non final mesage blocks: ≤ ℓ2ǫ/2

4. Collision in bottom row (see 3.)

Pr[NOCOLL] can be upper bound by 9 · ℓ2/(2n − 3ℓ)

AdvOPRP-CCAΠ (q, ℓ, t) ≤ 4ℓ2ǫ+ 9ℓ2

2n−3ℓ +AdvIND-SPRP

E ,E−1 (ℓ+2q,O(t))

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 22

Page 56: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

POET: INT-CTXT-Security

INT-CTXT proof is game-based

Combines the ideas from its OPRP-CCA proof and the

INT-CTXT proof from McOE

Details (→ CAESAR submission)

INT-CTXT Advantage

AdvINT-CTXTPOET (q, ℓ, t) ≤ (ℓ+ 2q)2/2n +

q

2n − q+ AdvOPRP-CCA

Π (q, ℓ, t)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 23

Page 57: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

Restated Security Claims

Bits of Security

Confidentiality for the plaintext log2(2128 − c · ǫ · ℓ2)

Integrity for the plaintext log2(2128 − c · ǫ · ℓ2)

Integrity for the associated data log2(2128 − c · ǫ · ℓ2)

Integrity for the public message number log2(2128 − c · ǫ · ℓ2)

Security against key recovery 128

Security against tag guessing 128

Yu Sasaki pointed out that our stated security claims had been

confusing

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 24

Page 58: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

Conclusion

POET

is non-sequential and on-line

support for intermediate tags

is robust against nonce- and decryption-misuse

(OCCA3-secure = OPRP-CCA + INT-CTXT)

fulfills the demanding requirements of high-speed networks

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 25

Page 59: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

Conclusion

POET

is non-sequential and on-line

support for intermediate tags

is robust against nonce- and decryption-misuse

(OCCA3-secure = OPRP-CCA + INT-CTXT)

fulfills the demanding requirements of high-speed networks

Final Remark: Cryptanalysis, fruitful remarks and third party

implementation etc. will be rewarded!

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 25

Page 60: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

The End

Thank you for your attention!

POET Homepage

http://www.uni-weimar.de/de/medien/professuren/

mediensicherheit/research/poet/

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 26

Page 61: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

——————————————————————-

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 27

Page 62: Pipelineable On-Line Encryption with Tag (POET) · Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 17. CAESAR Submission POET Software Performance Software performance with

Security of POET

Key Derivation

... EE E EE

EK (|M|)

EK (|M|)

τ X2 Xb−2

τ Y2 Yb−2

FK1FK1FK1

FK1FK1

FK2FK2

FK2FK2

FK2

τ

T β ||Z

M1 M2 Mb−1 Mb||τα

LT

LT

C1 C2 Cb−1 Cb||Tα

POET needs five 128-bit keys: K ,K1, and K2, L, and LT

They are derived from a 128 bit master key SK

K = ESK (0), L = ESK (1)

K1 = ESK (2) K2 = ESK (3),

LT = ESK (4)

(currently I am analysing the case: K1 = K2 and LT = 7L)

Cisco Systems, Bauhaus-Universität Weimar POET DIAC 2014 27