Paper 2024/294
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
Abstract
Authenticated Encryption (AE) modes of operation based on Tweakable Block Ciphers (TBC) usually measure efficiency in the number of calls to the underlying primitive per message block. On the one hand, many existing solutions reach a primitive-rate of 1, meaning that each n-bit block of message asymptotically needs a single call to the TBC with output length n. On the other hand, while these modes look optimal in a blackbox setting, they become less attractive when leakage comes into play, since all these calls must then be equally well protected to maintain security. Leakage-resistant modes improve this situation, by generating ephemeral keys every constant number of calls. However, rekeying is inherently suboptimal in primitive-rate, since a TBC call can only be used either to refresh a key or to encrypt a block. Even worse, existing solutions achieving almost n bits of security for n-bit secret keys have at most a primitive-rate 2/3. Hence the question: Can we design a highly-secure TBC-based rekeying mode with ``nearly optimal'' primitive-rate? We answer this question positively with Multiplex, a new mode that has primitive-rate d/(d+1) given a TBC with a dn-bit tweak. Multiplex achieves
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint.
- Keywords
- Leakage-ResistanceAuthenticated EncryptionTweakable Block Cipher
- Contact author(s)
-
thomas peters @ uclouvain be
yaobin shen @ xmu edu cn
fstandae @ uclouvain be - History
- 2024-02-23: approved
- 2024-02-21: received
- See all versions
- Short URL
- https://ia.cr/2024/294
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/294, author = {Thomas Peters and Yaobin Shen and François-Xavier Standaert}, title = {Multiplex: {TBC}-based Authenticated Encryption with Sponge-Like Rate}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/294}, year = {2024}, url = {https://eprint.iacr.org/2024/294} }