Unconditionally Secure Authenticated Encryption with Shorter Keys

Basel Alomair, Radha Poovendran

2009

Abstract

Confidentiality and integrity are two main objectives of security systems and the literature of cryptography is rich with proposed techniques to achieve them. To satisfy the requirements of a wide range of applications, a variety of techniques with different properties and performances have appeared in the literature. In this work, we address the problem of confidentiality and integrity in communications over public channels. We propose an unconditionally secure authenticated encryption that requires shorter key material than current state of the art. By combining properties of the integer field Zp with the fact that the message to be authenticated is unknown to adversaries (encrypted), message integrity is achieved using a single modular multiplication. Against an adversary equipped with a single antenna, the adversary’s probability of modifying a valid message in a way undetected by the intended receiver can be made an absolute zero. After the description of the basic scheme and its detailed security analysis are completed, we describe an extension to the main scheme that can substantially reduce the required amount of key material.

References

  1. Shannon, C.: Communication Theory and Secrecy Systems. Bell Telephone Laboratories (1949)
  2. Gilbert, E., MacWilliams, F., Sloane, N.: Codes which detect deception. Bell System Technical Journal 53 (1974) 405-424
  3. Wegman, M., Carter, J.: New classes and applications of hash functions. Foundations of Computer Science, 1979., 20th Annual Symposium on (1979) 175-182
  4. Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and Secure Message Authentication. Advances in Cryptology-Crypto'99: 19th Annual International Cryptology Conference, Santa Barbara, California, USA August 15-19, 1999 Proceedings (1999)
  5. US National Bureau of Standards: DES Modes of Operation. Federal Information Processing Standard (FIPS) Publication 81 Available as http://www.itl.nist.gov/fipspubs/fip81.htm (December 1980)
  6. Bellare, M., Guerin, R., Rogaway, P.: XOR MACs: New methods for message authentication using finite pseudorandom functions. Advances in Cryptology-CRYPTO95 (LNCS 963) (1995) 15-28
  7. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. Advances in Cryptology-CRYPTO 96 (1996) 1-15
  8. Rogaway, P., Black, J.: PMAC: Proposal to NIST for a parallelizable message authentication code (2001)
  9. Ylonen, T., Lonvick, C.: The Secure Shell (SSH) Transport Layer Protocol. Technical report, (RFC 4253, January 2006)
  10. Freier, A., Karlton, P., Kocher, P.: The SSL Protocol Version 3.0 (1996)
  11. Kent, S.: RFC4303: IP encapsulating security payload (ESP),. Internet EFC. STD. FYI/BCP archives. December (2005)
  12. Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology-ASIACRYPT (2000) 531-545
  13. KRAWCZYK, H.: The order of encryption and authentication for protecting communications(or: How secure is SSL?). Advances in Cryptology-CRYPTO 2001 (2001) 310-331
  14. Meyer, C., Matyas, S.: Cryptography: A New Dimension in Computer Data Security. John Wiley & Sons (1982)
  15. Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5). Technical report, RFC 1510, September 1993 (1993)
  16. Gligor, V., Donescu, P.: Integrity-Aware PCBC Encryption Schemes. Security Protocols: 7th International Workshop, Cambridge, Uk, April 19-21, 1999: Proceedings (2000)
  17. Jutla, C.: Encryption modes with almost free message integrity. Advances in CryptologyEUROCRYPT 2045 (2001) 529-544
  18. Gligor, V., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. Fast Software Encryption: 8th International Workshop, FSE 2001, Yokohama, Japan, April 2-4, 2001: Revised Papers (2002)
  19. Rogaway, P., Bellare, M., Black, J.: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. ACM Trans. Inf. Syst. Secur. 6 (2003) 365-403
  20. Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive, Fast Software Encryption 2003, LNCS 2887 (2003)
  21. Kohno, T., Viega, J., Whiting, D.: CWC: A high-performance conventional authenticated encryption mode. Fast Software Encryption (2004) 408-426
  22. Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. Fast Software Encryption (2004) 389-407
  23. Stinson, D.: Cryptography: Theory and Practice. CRC Press (2006)
  24. Goldreich, O.: Foundations of Cryptography. Cambridge University Press (2001)
  25. Cover, T., Thomas, J.: Elements of Information Theory. Wiley-Interscience New York (2006)
  26. Strasser, M., Popper, C., Capkun, S., Cagalj, M.: Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. In: IEEE Symposium on Security and Privacy, 2008. SP 2008. (2008) 64-78
  27. Kahn, D.: The codebreakers. Weidenfeld and Nicolson (1974)
  28. Cormen, T., Leiserson, C., Rivest, R.: Introduction to Algorithms. McGraw-Hill (1999)
Download


Paper Citation


in Harvard Style

Alomair B. and Poovendran R. (2009). Unconditionally Secure Authenticated Encryption with Shorter Keys . In Proceedings of the 7th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2009) ISBN 978-989-8111-91-3, pages 3-15. DOI: 10.5220/0002169600030015


in Bibtex Style

@conference{wosis09,
author={Basel Alomair and Radha Poovendran},
title={Unconditionally Secure Authenticated Encryption with Shorter Keys},
booktitle={Proceedings of the 7th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2009)},
year={2009},
pages={3-15},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002169600030015},
isbn={978-989-8111-91-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 7th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2009)
TI - Unconditionally Secure Authenticated Encryption with Shorter Keys
SN - 978-989-8111-91-3
AU - Alomair B.
AU - Poovendran R.
PY - 2009
SP - 3
EP - 15
DO - 10.5220/0002169600030015