Farfalle: parallel permutation-based cryptography

Authors

  • Guido Bertoni Security Pattern, Brescia, Italy
  • Joan Daemen STMicroelectronics, Diegem, Belgium; Radboud University, Nijmegen, The Netherlands
  • Seth Hoffert
  • Michaël Peeters STMicroelectronics, Diegem, Belgium
  • Gilles Van Assche STMicroelectronics, Diegem, Belgium
  • Ronny Van Keer STMicroelectronics, Diegem, Belgium

DOI:

https://doi.org/10.13154/tosc.v2017.i4.1-38

Keywords:

pseudorandom function, permutation-based cryptography, Keccak

Abstract

In this paper, we introduce Farfalle, a new permutation-based construction for building a pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary-length data strings, and returns an arbitrary-length output. It has a compression layer and an expansion layer, each involving the parallel application of a permutation. The construction also makes use of LFSR-like rolling functions for generating input and output masks and for updating the inner state during expansion. On top of the inherent parallelism, Farfalle instances can be very efficient because the construction imposes less requirements on the underlying primitive than, e.g., the duplex construction or typical block cipher modes. Farfalle has an incremental property: compression of common prefixes of inputs can be factored out. Thanks to its input-output characteristics, Farfalle is really versatile. We specify simple modes on top of it for authentication, encryption and authenticated encryption, as well as a wide block cipher mode. As a showcase, we present Kravatte, a very efficient instance of Farfalle based on Keccak-p[1600, nr] permutations and formulate concrete security claims against classical and quantum adversaries. The permutations in the compression and expansion layers of Kravatte have only 6 rounds apiece and the rolling functions are lightweight. We provide a rationale for our choices and report on software performance.

Published

2017-12-15

Issue

Section

Articles

How to Cite

Farfalle: parallel permutation-based cryptography. (2017). IACR Transactions on Symmetric Cryptology, 2017(4), 1-38. https://doi.org/10.13154/tosc.v2017.i4.1-38