Paper 2021/1696

Categorization of Faulty Nonce Misuse Resistant Message Authentication

Yu Long Chen
Bart Mennink
Bart Preneel
Abstract

A growing number of lightweight block ciphers are proposed for environments such as the Internet of Things. An important contribution to the reduced implementation cost is a block length n of 64 or 96 bits rather than 128 bits. As a consequence, encryption modes and message authentication code (MAC) algorithms require security beyond the 2^{n/2} birthday bound. This paper provides an extensive treatment of MAC algorithms that offer beyond birthday bound PRF security for both nonce-respecting and nonce-misusing adversaries. We study constructions that use two block cipher calls, one universal hash function call and an arbitrary number of XOR operations. We start with the separate problem of generically identifying all possible secure n-to-n-bit pseudorandom functions (PRFs) based on two block cipher calls. The analysis shows that the existing constructions EDM, SoP, and EDMD are the only constructions of this kind that achieve beyond birthday bound security. Subsequently we deliver an exhaustive treatment of MAC algorithms, where the outcome of a universal hash function evaluation on the message may be entered at any point in the computation of the PRF. We conclude that there are a total amount of nine schemes that achieve beyond birthday bound security, and a tenth construction that cannot be proven using currently known proof techniques. For these former nine MAC algorithms, three constructions achieve optimal n-bit security in the nonce-respecting setting, but are completely insecure if the nonce is reused. The remaining six constructions have 3n/4-bit security in the nonce-respecting setting, and only four out of these six constructions still achieve beyond the birthday bound security in the case of nonce misuse.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
A major revision of an IACR publication in ASIACRYPT 2021
Keywords
PRFbeyond birthday bound securityfaulty nonce modelEDMSoPEDMD
Contact author(s)
yulong chen @ esat kuleuven be
History
2024-05-12: revised
2021-12-30: received
See all versions
Short URL
https://ia.cr/2021/1696
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1696,
      author = {Yu Long Chen and Bart Mennink and Bart Preneel},
      title = {Categorization of Faulty Nonce Misuse Resistant Message Authentication},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/1696},
      year = {2021},
      url = {https://eprint.iacr.org/2021/1696}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.