Security of Streaming Encryption in Google's Tink Library

5Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We analyze the multi-user security of the streaming encryption in Google's Tink library via an extended version of the framework of nonce-based online authenticated encryption of Hoang et al. (CRYPTO'15) to support random-access decryption. We show that Tink's design choice of using random nonces and a nonce-based key-derivation function indeed improves the concrete security bound. We then give two better alternatives that are more robust against randomness failure. In addition, we show how to efficiently instantiate the key-derivation function via AES, instead of relying on HMAC-SHA256 like the current design in Tink. To accomplish this we give a multi-user analysis of the XOR-of-permutation construction of Bellare, Krovetz, and Rogaway (EUROCRYPT'98).

Cite

CITATION STYLE

APA

Hoang, V. T., & Shen, Y. (2020). Security of Streaming Encryption in Google’s Tink Library. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 243–262). Association for Computing Machinery. https://doi.org/10.1145/3372297.3417273

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free