Abstract
We analyze the multi-user security of the streaming encryption in Google's Tink library via an extended version of the framework of nonce-based online authenticated encryption of Hoang et al. (CRYPTO'15) to support random-access decryption. We show that Tink's design choice of using random nonces and a nonce-based key-derivation function indeed improves the concrete security bound. We then give two better alternatives that are more robust against randomness failure. In addition, we show how to efficiently instantiate the key-derivation function via AES, instead of relying on HMAC-SHA256 like the current design in Tink. To accomplish this we give a multi-user analysis of the XOR-of-permutation construction of Bellare, Krovetz, and Rogaway (EUROCRYPT'98).
Author supplied keywords
Cite
CITATION STYLE
Hoang, V. T., & Shen, Y. (2020). Security of Streaming Encryption in Google’s Tink Library. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 243–262). Association for Computing Machinery. https://doi.org/10.1145/3372297.3417273
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.