On the Quantum Security of OCB

Authors

  • Varun Maram Department of Computer Science, ETH Zürich, Zürich, Switzerland
  • Daniel Masny Meta Research, Menlo Park, USA
  • Sikhar Patranabis IBM Research, Bangalore, India
  • Srinivasan Raghuraman Visa Research, Palo Alto, USA

DOI:

https://doi.org/10.46586/tosc.v2022.i2.379-414

Keywords:

OCB, IND-qCPA security, universal forgeability, Simon’s Algorithm, Deutsch’s Algorithm, XTS

Abstract

The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 and OCB3 can be used as secure authenticated encryption schemes whereas OCB2 has been shown to be classically insecure (Inoue et al., Crypto 2019). Even further, in the presence of quantum queries to the encryption functionality, a series of works by Kaplan et al. (Crypto 2016), Bhaumik et al. (Asiacrypt 2021) and Bonnetain et al. (Asiacrypt 2021) have shown how to break the unforgeability of the OCB modes. However, these works did not consider the confidentiality of OCB in the presence of quantum queries.
We fill this gap by presenting the first formal analysis of the IND-qCPA security of OCB. In particular, we show the first attacks breaking the IND-qCPA security of the OCB modes. Surprisingly, we are able to prove that OCB2 is IND-qCPA secure when used without associated data, while relying on the assumption that the underlying block cipher is a quantum-secure pseudorandom permutation. Additionally, we present new quantum attacks breaking the universal unforgeability of OCB. Our analysis of OCB has implications for the post-quantum security of XTS, a well-known disk encryption standard, that was considered but mostly left open by Anand et al. (PQCrypto 2016).

Published

2022-06-10

Issue

Section

Articles

How to Cite

On the Quantum Security of OCB. (2022). IACR Transactions on Symmetric Cryptology, 2022(2), 379-414. https://doi.org/10.46586/tosc.v2022.i2.379-414