Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC

27Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

At CRYPTO 2016, Cogliati and Seurin have proposed a highly secure nonce-based MAC called Encrypted Wegman-Carter with Davies-Meyer (EWCDM) construction, as EK2(formula presented) for a nonce N and a message M. This construction achieves roughly 22n/3 bit MAC security with the assumption that E is a PRP secure n-bit block cipher and H is an almost xor universal n-bit hash function. In this paper we propose Decrypted Wegman-Carter with Davies-Meyer (DWCDM) construction, which is structurally very similar to its predecessor EWCDM except that the outer encryption call is replaced by decryption. The biggest advantage of DWCDM is that we can make a truly single key MAC: the two block cipher calls can use the same block cipher key K= K1= K2. Moreover, we can derive the hash key as Kh= EK(1), as long as | Kh| = n. Whether we use encryption or decryption in the outer layer makes a huge difference; using the decryption instead enables us to apply an extended version of the mirror theory by Patarin to the security analysis of the construction. DWCDM is secure beyond the birthday bound, roughly up to 22n/3 MAC queries and 2n verification queries against nonce-respecting adversaries. DWCDM remains secure up to 22n/2 MAC queries and 2n verification queries against nonce-misusing adversaries.

Cite

CITATION STYLE

APA

Datta, N., Dutta, A., Nandi, M., & Yasuda, K. (2018). Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10991 LNCS, pp. 631–661). Springer Verlag. https://doi.org/10.1007/978-3-319-96884-1_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free