Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate

Authors

  • Yaobin Shen School of Informatics, Xiamen University, Xiamen, China
  • Thomas Peters UCLouvain, ICTEAM, Crypto Group, Louvain-la-Neuve, Belgium
  • François-Xavier Standaert UCLouvain, ICTEAM, Crypto Group, Louvain-la-Neuve, Belgium

DOI:

https://doi.org/10.46586/tosc.v2024.i2.1-34

Keywords:

Leakage-Resistance, Authenticated Encryption, Tweakable Block Cipher

Abstract

Authenticated Encryption (AE) modes of operation based on Tweakable Block Ciphers (TBC) usually measure efficiency in the number of calls to the underlying primitive per message block. On the one hand, many existing solutions reach a primitive-rate of 1, meaning that each n-bit block of message asymptotically needs a single call to the TBC with output length n. On the other hand, while these modes look optimal in a blackbox setting, they become less attractive when leakage comes into play, since all these calls must then be equally well protected to maintain security. Leakage-resistant modes improve this situation, by generating ephemeral keys every constant number of calls. However, rekeying is inherently suboptimal in primitive-rate, since a TBC call can only be used either to refresh a key or to encrypt a block. Even worse, existing solutions achieving almost n bits of security for n-bit secret keys have at most a primitive-rate 2/3. Hence the question: Can we design a highly-secure TBC-based rekeying mode with “nearly optimal” primitive-rate? We answer this question positively with Multiplex, a new mode that has primitive-rate d/(d + 1) given a TBC with a dn-bit tweak. Multiplex achieves n − log2(dn) bits of security for both (i) misuse-resilience CCA confidentiality security in the blackbox setting and (ii) Ciphertext Integrity with Misuse-resistant and unbounded Leakage in encryption and decryption (CIML2). It also provides (iii) confidentiality with leakage up to the birthday bound. Furthermore, Multiplex can run d + 1 calls in parallel in each iteration. The combination of these features gives a mode of operation that inherits most of the good implementation features and flexibility of a sponge construction – therefore paving the way towards sound comparisons between TBC-based and permutation-based AE.

Downloads

Published

2024-06-18

Issue

Section

Articles

How to Cite

Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate. (2024). IACR Transactions on Symmetric Cryptology, 2024(2), 1-34. https://doi.org/10.46586/tosc.v2024.i2.1-34