Paper 2018/534
Cryptographic Constructions Supporting Implicit Data Integrity
Michael Kounavis and David Durham and Sergej Deutsch and Antonios Papadimitriou and Amitabh Das
Abstract
We study a methodology for supporting data integrity called 'implicit integrity' and present cryptographic constructions supporting it. Implicit integrity allows for corruption detection without producing, storing or verifying mathematical summaries of the content such as MACs and ICVs, or any other type of message expansion. As with authenticated encryption, the main idea behind this methodology is that, whereas typical user data demonstrate patterns such as repeated bytes or words, decrypted data resulting from corrupted ciphertexts no longer demonstrate such patterns. Thus, by checking the entropy of some decrypted ciphertexts, corruption can be possibly detected. The main contribution of this paper is a new notion of security which is associated with implicit integrity, and which is different from the typical requirement that the output of cryptographic systems should be indistinguishable from the output of a random permutation. The notion of security we discuss reflects the fact that it should be computationally difficult for an adversary to corrupt some ciphertext so that the resulting plaintext demonstrates specific patterns. For this purpose, we introduce two kinds of adversaries. First, an input perturbing adversary performs content corruption attacks. Second an oracle replacing adversary performs content replay attacks. We discuss requirements for supporting implicit integrity in these two adversary models, and provide security bounds for a construction called IVP, a three-level confusion diffusion network which can support implicit integrity and is inexpensive to implement.
Note: some more minor fixes
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Data IntegrityImplicit IntegrityObserver Functions
- Contact author(s)
- michael e kounavis @ intel com
- History
- 2021-02-17: last of 5 revisions
- 2018-06-04: received
- See all versions
- Short URL
- https://ia.cr/2018/534
- License
-
CC BY