COLM 验证加密方案

IF 2.3 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS
{"title":"COLM 验证加密方案","authors":"","doi":"10.1007/s00145-024-09492-8","DOIUrl":null,"url":null,"abstract":"<h3>Abstract</h3> <p>In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the <em>defense in depth</em> category of the CAESAR competition. COLM realizes a nonce-based authenticated encryption with associated data and uses the popular AES blockcipher as its underlying primitive. We propose two possible blockcipher instantiations (with key of length 128 or 256 bits). We also define two COLM modes of operation variants: a primary COLM<span> <span>\\(_0\\)</span> </span> mode for general purpose applications, and a COLM<span> <span>\\(_{\\tau }\\)</span> </span> variant with intermediate tag generation/verification geared to support low-end devices and applications where frequent verification is required. COLM is designed with security, simplicity, and efficiency in mind. The main design goal of COLM is <em>high security</em>: a primary feature of the defense in depth CAESAR category. COLM provides security beyond the traditional AE security. First, COLM is <em>secure against nonce misuse</em>, namely, it enables security in adversarial settings where the nonce inputs to the AE scheme repeat. In contrast to standardized and popular AE algorithms, such as GCM and OCB1-3 modes, whose AE security trivially breaks down when the nonce is repeated, COLM ensures both confidentiality and authenticity (AE) security with repeated nonces. Second, our COLM<span> <span>\\(_{\\tau }\\)</span> </span> variant enables increased security levels in situations where <em>release of unverified ciphertext</em> (RUP) occurs due to its ability to limit a potential leakage by frequent verifications. In this work we prove COLM secure with respect to both confidentiality and authenticity (AE) security under nonce misuse in the well-known provable security framework. Our proofs show that COLM maintains <em>n</em>/2-bit security levels for block sizes of <em>n</em> bits. Furthermore, due to the inherent parallelism on both mode and primitive levels, our software performance results show that the price paid for enhanced security does come at the cost of minimal efficiency losses. More concretely, we implement GCM, COLM, and Deoxys-II on the Kaby Lake and Coffee lake Intel platforms. Compared to the other winner in the defense in depth category Deoxys-II, our AE design COLM<span> <span>\\(_0\\)</span> </span> performs 10–20% faster for the 128-bit key version. Regarding the 256-bit key versions COLM<span> <span>\\(_0\\)</span> </span> is around 5% faster for short and 2% slower than Deoxys-II for the longer messages.</p>","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"88 1","pages":""},"PeriodicalIF":2.3000,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The COLM Authenticated Encryption Scheme\",\"authors\":\"\",\"doi\":\"10.1007/s00145-024-09492-8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<h3>Abstract</h3> <p>In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the <em>defense in depth</em> category of the CAESAR competition. COLM realizes a nonce-based authenticated encryption with associated data and uses the popular AES blockcipher as its underlying primitive. We propose two possible blockcipher instantiations (with key of length 128 or 256 bits). We also define two COLM modes of operation variants: a primary COLM<span> <span>\\\\(_0\\\\)</span> </span> mode for general purpose applications, and a COLM<span> <span>\\\\(_{\\\\tau }\\\\)</span> </span> variant with intermediate tag generation/verification geared to support low-end devices and applications where frequent verification is required. COLM is designed with security, simplicity, and efficiency in mind. The main design goal of COLM is <em>high security</em>: a primary feature of the defense in depth CAESAR category. COLM provides security beyond the traditional AE security. First, COLM is <em>secure against nonce misuse</em>, namely, it enables security in adversarial settings where the nonce inputs to the AE scheme repeat. In contrast to standardized and popular AE algorithms, such as GCM and OCB1-3 modes, whose AE security trivially breaks down when the nonce is repeated, COLM ensures both confidentiality and authenticity (AE) security with repeated nonces. Second, our COLM<span> <span>\\\\(_{\\\\tau }\\\\)</span> </span> variant enables increased security levels in situations where <em>release of unverified ciphertext</em> (RUP) occurs due to its ability to limit a potential leakage by frequent verifications. In this work we prove COLM secure with respect to both confidentiality and authenticity (AE) security under nonce misuse in the well-known provable security framework. Our proofs show that COLM maintains <em>n</em>/2-bit security levels for block sizes of <em>n</em> bits. Furthermore, due to the inherent parallelism on both mode and primitive levels, our software performance results show that the price paid for enhanced security does come at the cost of minimal efficiency losses. More concretely, we implement GCM, COLM, and Deoxys-II on the Kaby Lake and Coffee lake Intel platforms. Compared to the other winner in the defense in depth category Deoxys-II, our AE design COLM<span> <span>\\\\(_0\\\\)</span> </span> performs 10–20% faster for the 128-bit key version. Regarding the 256-bit key versions COLM<span> <span>\\\\(_0\\\\)</span> </span> is around 5% faster for short and 2% slower than Deoxys-II for the longer messages.</p>\",\"PeriodicalId\":54849,\"journal\":{\"name\":\"Journal of Cryptology\",\"volume\":\"88 1\",\"pages\":\"\"},\"PeriodicalIF\":2.3000,\"publicationDate\":\"2024-03-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Cryptology\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s00145-024-09492-8\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Cryptology","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s00145-024-09492-8","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

摘要 在这项工作中,我们介绍了 COLM 验证加密(AE)方案,它是 CAESAR 竞赛深度防御类两个获奖方案中的第二个。COLM 使用流行的 AES 区块密码作为底层原语,实现了基于非密钥的验证加密和相关数据。我们提出了两种可能的块密码实例(密钥长度为 128 或 256 位)。我们还定义了两种 COLM 运行模式变体:一种是用于通用应用的主要 COLM 模式,另一种是具有中间标签生成/验证功能的 COLM 变体,用于支持低端设备和需要频繁验证的应用。COLM 在设计时充分考虑了安全性、简单性和高效性。COLM 的主要设计目标是高安全性:这是深度防御 CAESAR 类别的主要特征。COLM 的安全性超越了传统的 AE 安全性。首先,COLM 可以防止非 Cce 的滥用,即在 AE 方案的非 Cce 输入重复的对抗环境中实现安全性。与标准化的流行 AE 算法(如 GCM 和 OCB1-3 模式)相比,当非ce 重复输入时,其 AE 安全性就会崩溃,而 COLM 可确保重复输入非ce 时的保密性和真实性(AE)安全。其次,由于我们的 COLM 变体能够通过频繁验证来限制潜在泄漏,因此在发生未验证密文发布(RUP)的情况下,我们的 COLM 变体能够提高安全级别。在这项工作中,我们在著名的可证明安全性框架中证明了 COLM 在非ce 滥用情况下的保密性和真实性(AE)安全性。我们的证明表明,对于 n 位的数据块大小,COLM 可保持 n/2 位的安全等级。此外,由于模式和基元层面的内在并行性,我们的软件性能结果表明,为增强安全性所付出的代价确实是效率损失最小。更具体地说,我们在 Kaby Lake 和 Coffee Lake 英特尔平台上实现了 GCM、COLM 和 Deoxys-II。与深度防御类别中的另一个优胜者 Deoxys-II 相比,我们的 AE 设计 COLM \(_0\) 在 128 位密钥版本上的性能快 10-20%。至于256位密钥版本,COLM \(_0\)在短信息方面比Deoxys-II快5%左右,在长信息方面比Deoxys-II慢2%左右。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The COLM Authenticated Encryption Scheme

Abstract

In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the CAESAR competition. COLM realizes a nonce-based authenticated encryption with associated data and uses the popular AES blockcipher as its underlying primitive. We propose two possible blockcipher instantiations (with key of length 128 or 256 bits). We also define two COLM modes of operation variants: a primary COLM \(_0\) mode for general purpose applications, and a COLM \(_{\tau }\) variant with intermediate tag generation/verification geared to support low-end devices and applications where frequent verification is required. COLM is designed with security, simplicity, and efficiency in mind. The main design goal of COLM is high security: a primary feature of the defense in depth CAESAR category. COLM provides security beyond the traditional AE security. First, COLM is secure against nonce misuse, namely, it enables security in adversarial settings where the nonce inputs to the AE scheme repeat. In contrast to standardized and popular AE algorithms, such as GCM and OCB1-3 modes, whose AE security trivially breaks down when the nonce is repeated, COLM ensures both confidentiality and authenticity (AE) security with repeated nonces. Second, our COLM \(_{\tau }\) variant enables increased security levels in situations where release of unverified ciphertext (RUP) occurs due to its ability to limit a potential leakage by frequent verifications. In this work we prove COLM secure with respect to both confidentiality and authenticity (AE) security under nonce misuse in the well-known provable security framework. Our proofs show that COLM maintains n/2-bit security levels for block sizes of n bits. Furthermore, due to the inherent parallelism on both mode and primitive levels, our software performance results show that the price paid for enhanced security does come at the cost of minimal efficiency losses. More concretely, we implement GCM, COLM, and Deoxys-II on the Kaby Lake and Coffee lake Intel platforms. Compared to the other winner in the defense in depth category Deoxys-II, our AE design COLM \(_0\) performs 10–20% faster for the 128-bit key version. Regarding the 256-bit key versions COLM \(_0\) is around 5% faster for short and 2% slower than Deoxys-II for the longer messages.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Cryptology
Journal of Cryptology 工程技术-工程:电子与电气
CiteScore
7.10
自引率
3.30%
发文量
24
审稿时长
18 months
期刊介绍: The Journal of Cryptology is a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Coverage includes such topics as public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, key management and quantum cryptography. In addition to full-length technical, survey, and historical articles, the journal publishes short notes.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信