Skip to main content

2020 | OriginalPaper | Buchkapitel

Authenticated Encryption Based on Lesamnta-LW Hashing Mode

verfasst von : Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida

Erschienen in: Information Security and Cryptology – ICISC 2019

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authenticated encryption refers to symmetric cryptography providing both privacy and authenticity. It is most common to construct it as a block-cipher mode of operation. Another promising approach is to construct it based on cryptographic hashing. This paper proposes a nonce-based authenticated encryption scheme based on the Lesamnta-LW hashing mode. Lesamnta-LW is a block-cipher-based iterated hash function, which is specified in the ISO/IEC 29192-5 lightweight hash-function standard. This paper also shows that the proposed scheme is secure if the underlying block cipher is a pseudorandom permutation. Both of the other ISO/IEC 29192-5 mechanisms, PHOTON and SPONGENT, are hardware-oriented sponge-based hash functions, and nonce-based authenticated encryption schemes can also be constructed based on them. On the other hand, Lesamnta-LW is a software-oriented Merkle-Damgård hash function. Thus, the proposed scheme is a new option for authenticated encryption based on lightweight cryptographic hashing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
5.
Zurück zum Zitat Berti, F., Pereira, O., Standaert, F.-X.: Reducing the cost of authenticity with leakages: a \({\sf CIML2}\)-secure \({\sf AE}\) scheme with one call to a strongly protected tweakable block cipher. In: Buchmann, J., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2019. LNCS, vol. 11627, pp. 229–249. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-23696-0_12CrossRef Berti, F., Pereira, O., Standaert, F.-X.: Reducing the cost of authenticity with leakages: a \({\sf CIML2}\)-secure \({\sf AE}\) scheme with one call to a strongly protected tweakable block cipher. In: Buchmann, J., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2019. LNCS, vol. 11627, pp. 229–249. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-23696-0_​12CrossRef
6.
Zurück zum Zitat Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. In: ECRYPT Hash Workshop (2007) Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. In: ECRYPT Hash Workshop (2007)
12.
Zurück zum Zitat Damgård, I.: A design principle for hash functions. In: Brassard [10], pp. 416–427 Damgård, I.: A design principle for hash functions. In: Brassard [10], pp. 416–427
14.
Zurück zum Zitat FIPS PUB 180–4: Secure hash standard (SHS), August 2015 FIPS PUB 180–4: Secure hash standard (SHS), August 2015
15.
Zurück zum Zitat FIPS PUB 197: Advanced encryption standard (AES) (2001) FIPS PUB 197: Advanced encryption standard (AES) (2001)
16.
Zurück zum Zitat FIPS PUB 202: SHA-3 standard: Permutation-based hash and extendable-output functions (2015) FIPS PUB 202: SHA-3 standard: Permutation-based hash and extendable-output functions (2015)
17.
18.
Zurück zum Zitat Guo, C., Pereira, O., Peters, T., Standaert, F.X.: Authenticated encryption with nonce misuse and physical leakages: definitions, separation results, and leveled constructions. Cryptology ePrint Archive, Report 2018/484 (2018). https://eprint.iacr.org/2018/484 Guo, C., Pereira, O., Peters, T., Standaert, F.X.: Authenticated encryption with nonce misuse and physical leakages: definitions, separation results, and leveled constructions. Cryptology ePrint Archive, Report 2018/484 (2018). https://​eprint.​iacr.​org/​2018/​484
19.
Zurück zum Zitat Guo, C., Pereira, O., Peters, T., Standaert, F.X.: Towards low-energy leakage-resistant authenticated encryption from the duplex sponge construction. Cryptology ePrint Archive, Report 2019/193 (2019). https://eprint.iacr.org/2019/193 Guo, C., Pereira, O., Peters, T., Standaert, F.X.: Towards low-energy leakage-resistant authenticated encryption from the duplex sponge construction. Cryptology ePrint Archive, Report 2019/193 (2019). https://​eprint.​iacr.​org/​2019/​193
21.
Zurück zum Zitat Hirose, S., Ideguchi, K., Kuwakado, H., Owada, T., Preneel, B., Yoshida, H.: An AES based 256-bit hash function for lightweight applications: Lesamnta-LW. IEICE Trans. Fundam. E95–A(1), 89–99 (2012)CrossRef Hirose, S., Ideguchi, K., Kuwakado, H., Owada, T., Preneel, B., Yoshida, H.: An AES based 256-bit hash function for lightweight applications: Lesamnta-LW. IEICE Trans. Fundam. E95–A(1), 89–99 (2012)CrossRef
23.
Zurück zum Zitat ISO/IEC 19772: Information technology – security techniques – authenticated encryption (2009) ISO/IEC 19772: Information technology – security techniques – authenticated encryption (2009)
24.
Zurück zum Zitat ISO/IEC 29192-5: Information technology – security techniques – lightweight cryptography – part 5: Hash-functions (2016) ISO/IEC 29192-5: Information technology – security techniques – lightweight cryptography – part 5: Hash-functions (2016)
26.
Zurück zum Zitat Katz, J., Yung, M.: Complete characterization of security notions for probabilistic private-key encryption. In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, pp. 245–254 (2000) Katz, J., Yung, M.: Complete characterization of security notions for probabilistic private-key encryption. In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, pp. 245–254 (2000)
27.
Zurück zum Zitat Merkle, R.C.: One way hash functions and DES. In: Brassard [10], pp. 428–446 Merkle, R.C.: One way hash functions and DES. In: Brassard [10], pp. 428–446
29.
Zurück zum Zitat NIST Special Publication 800-38C: Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality (2004) NIST Special Publication 800-38C: Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality (2004)
30.
Zurück zum Zitat NIST Special Publication 800-38D: Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC (2007) NIST Special Publication 800-38D: Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC (2007)
31.
Zurück zum Zitat Pereira, O., Standaert, F., Vivek, S.: Leakage-resilient authentication and encryption from symmetric cryptographic primitives. In: Ray, I., Li, N., Kruegel, C. (eds.) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015, pp. 96–108. ACM (2015). https://doi.org/10.1145/2810103.2813626 Pereira, O., Standaert, F., Vivek, S.: Leakage-resilient authentication and encryption from symmetric cryptographic primitives. In: Ray, I., Li, N., Kruegel, C. (eds.) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015, pp. 96–108. ACM (2015). https://​doi.​org/​10.​1145/​2810103.​2813626
33.
Zurück zum Zitat Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: a block-cipher mode of operation for efficient authenticated encryption. In: ACM Conference on Computer and Communications Security, pp. 196–205 (2001) Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: a block-cipher mode of operation for efficient authenticated encryption. In: ACM Conference on Computer and Communications Security, pp. 196–205 (2001)
Metadaten
Titel
Authenticated Encryption Based on Lesamnta-LW Hashing Mode
verfasst von
Shoichi Hirose
Hidenori Kuwakado
Hirotaka Yoshida
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-40921-0_3