new bounds for pmac, tmac, and xcbc

23
New Bounds for PMAC, TMAC, and XCBC Kazuhiko Minematsu and Toshiyasu Matsushima, NEC Corp. and Waseda University Fast Software Encryption 2007, March 26-28, Luxembourg City, Luxembourg

Upload: nigel

Post on 13-Jan-2016

33 views

Category:

Documents


0 download

DESCRIPTION

New Bounds for PMAC, TMAC, and XCBC. Kazuhiko Minematsu and Toshiyasu Matsushima, NEC Corp. and Waseda University. Fast Software Encryption 2007, March 26-28, Luxembourg City, Luxembourg. Introduction. Message authentication code (MAC) from block ciphers (BCs) - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: New Bounds for  PMAC, TMAC, and XCBC

New Bounds for PMAC, TMAC, and XCBCKazuhiko Minematsu andToshiyasu Matsushima,NEC Corp. and Waseda University

Fast Software Encryption 2007, March 26-28, Luxembourg City, Luxembourg

Page 2: New Bounds for  PMAC, TMAC, and XCBC

2

Introduction

Message authentication code (MAC) from block ciphers (BCs)

“BC-only” modes: no special function other than a block cipher

Ex. Encrypted CBC-MAC (EMAC)

Page 3: New Bounds for  PMAC, TMAC, and XCBC

3

Security notion of MACs

Advantage in distinguishing MAC from the (keyed) random oracle (RO), , using CPA Small advantage implies small MAC forgery prob.

Note: We only consider the info-theoretic security, but our results have simple computational counterparts

: number of queries: max. message length (in n-bit): total number of queried blocks

can contain

(but not vice versa)

Page 4: New Bounds for  PMAC, TMAC, and XCBC

4

Related works on EMAC

Previous EMAC security bound is:

when it is implemented w/ two n-bit uniform random permutations (URPs), and

EMAC w/ two URPs

[BR00]

room for improvement?

Page 5: New Bounds for  PMAC, TMAC, and XCBC

5

Related works on EMAC (contd.)

Bellare, Pietrzak, and Rogaway [BPR05]

is a function that grows very slowly with

Note: Pietrzak [P06] obtained a tighter bound for a range of parameters

(much smaller than )

If , the bound is roughly

Page 6: New Bounds for  PMAC, TMAC, and XCBC

6

Our contribution

New security bounds for PMAC (a parallelizable MAC)TMAC and XCBC (successors of EMAC)

Old: or New: for PMAC, and for TMAC & XCBC

compared w/ , from quadratic to (almost) linear degradation wrt

compared w/ , better in most (but not all) cases

Page 7: New Bounds for  PMAC, TMAC, and XCBC

7

Analysis of PMAC

Page 8: New Bounds for  PMAC, TMAC, and XCBC

8

PMAC (Black-Rogaway[BR02], Rogaway[R04])

Hashing with mask-encrypt-sum (PHASH) still BC-only: masks are generated w/ few bitshifts

and XORs

PMAC ([R04] version w/ 128 bit block size)

PHASH

input

Page 9: New Bounds for  PMAC, TMAC, and XCBC

9

Overview of old proof [R04]

“Perfect” PMAC using independent URPs as an intermediate function

Use triangle inequality

Perfect PMACPMAC RO

Old bound: (also , as )

Page 10: New Bounds for  PMAC, TMAC, and XCBC

10

Overview of new proof

A different intermediate function, the modified PMAC (MPMAC)PHASH + independent finalization

MPMACPMAC RO

Page 11: New Bounds for  PMAC, TMAC, and XCBC

11

MPMAC vs. Random Oracle

What we need is: (a stronger form of ) differential probability of PHASH

...

.........

used for MPMAC vs. RO

used for PMAC vs. MPMAC

... ...

Page 12: New Bounds for  PMAC, TMAC, and XCBC

12

Diff. probability of PHASH

A subset of input blocks may generate the same URP input Odd (Even) collision involves odd (even) number of input blocks

Let denote odd collisions with non-zero URP inputs

Then, critical event is , as it implies the sum = 0 or w/ prob. 1 (as )

...

.........

even collision

odd collision... ...

Page 13: New Bounds for  PMAC, TMAC, and XCBC

13

Diff. probability of PHASH (contd.)

is at most Given , PHASH sum is almost uniform (point

probability is at most )

for any

Lemma 2

From Lemma 2, the advantage between MPMAC and RO is:

Page 14: New Bounds for  PMAC, TMAC, and XCBC

14

PMAC vs. MPMAC

Four “good” events defined as:

the sets of URP inputs in PHASH and in the finalization (+ dummy mask for MPMAC) have no intersection

Using Maurer’s method [M02], the advantage is at most the max. prob. of “bad” events in MPMAC, denoted by

Page 15: New Bounds for  PMAC, TMAC, and XCBC

15

New bound for PMAC

A careful analysis using Lemma 2 provides

if

MPMACPMAC RO

Theorem 2

Page 16: New Bounds for  PMAC, TMAC, and XCBC

16

As long as there is a small (but not too small) fraction of long messages, the new bound is better

Much better under some practical cases (e.g., all messages have similar lengths)

Comparison of new and old bounds

New ( ) < old ( ) iff Ex:

New bound is 2-32 , old bound is 2-48~2-16 If 99.9% messages are one-block, old bound is better If at least 1% messages are -block, new bound is better

(if we ignore constants)

Page 17: New Bounds for  PMAC, TMAC, and XCBC

17

Analysis of TMAC and XCBC

Page 18: New Bounds for  PMAC, TMAC, and XCBC

18

TMAC [KI03] and XCBC [BR00]

Successors of EMACfewer BC calls (no double encryption)one BC key + one or two n-bit keys

is independent of

TMAC

Page 19: New Bounds for  PMAC, TMAC, and XCBC

19

Proof sketch for TMAC (XCBC is the same)

Modified TMAC (MTMAC) and bad events similar to those for PMAC

Adv. between TMAC and MTMAC is

much simpler analysis due to the independence of

Adv. between MTMAC and RO is EMAC bound of [BPR05], i.e.,

Page 20: New Bounds for  PMAC, TMAC, and XCBC

20

New bounds for TMAC and XCBC

Old bounds are or forTMAC’s new bound is:

Theorem 3(XCBC’s bound is the same)

[BR00][KI03][IK03s]

Bound comparison is almost the same as PMAC’s case, in case the second term is negligible

Page 21: New Bounds for  PMAC, TMAC, and XCBC

21

Short comments on OMAC [IK03o]

OMAC (aka CMAC) is one-key CBC-MACimprovement to TMAC and XCBC

mask is or , where

MOMAC and bad events are similarly definedhowever, the probabilities of some new

bad events have to be evaluated such as

an extension of CBC collision analysis [BPR05] is needed (open problem)

Page 22: New Bounds for  PMAC, TMAC, and XCBC

22

Conclusion

New bounds for PMAC, TMAC, and XCBCfrom quadratic to (almost) linear

degradation wrt the max. message lengthFuture directions

OMACfurther improvement (still far from the

lower bound )

Page 23: New Bounds for  PMAC, TMAC, and XCBC

23

Thank you!