Multi-user Security of the Elephant v2 Authenticated Encryption Mode

Tim Beyne, Yu Long Chen, Christoph Erwin Dobraunig*, Bart Mennink

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

One of the finalists in the NIST Lightweight Cryptography competition is Elephant v2, a parallelizable, permutation-based authenticated encryption scheme. The original first/second-round submission Elephant v1/v1.1 was proven secure against nonce-respecting adversaries in the single-user setting. For the final round, the mode has undergone certain subtle modifications, the most important one being a change in the authentication portion of the mode. These changes require a new dedicated security proof. In this work, we prove the security of the Elephant v2 mode. First of all, our proof shows that Elephant v2 is indeed a secure authenticated encryption scheme and that its security against nonce-respecting adversaries is on par with that of Elephant v1/v1.1. In addition, our security analysis is in the multi-user setting and demonstrates that Elephant v2 fares well if multiple devices use Elephant v2 with independent keys. Moreover, our proof shows that Elephant v2 even ensures authenticity under nonce misuse.

Originalspracheenglisch
TitelSelected Areas in Cryptography - 28th International Conference, Revised Selected Papers
UntertitelSAC 2021
Redakteure/-innenRiham AlTawy, Andreas Hülsing
ErscheinungsortCham
Herausgeber (Verlag)Springer
Seiten155-178
Seitenumfang24
ISBN (elektronisch)978-303099276-7
ISBN (Print)9783030992767
DOIs
PublikationsstatusVeröffentlicht - 2022
Extern publiziertJa
Veranstaltung28th International Conference on Selected Areas in Cryptography: SAC 2021 - Virtuell
Dauer: 29 Sept. 20211 Okt. 2021

Publikationsreihe

NameLecture Notes in Computer Science
Herausgeber (Verlag)Springer Verlag
Band13203
ISSN (Print)0302-9743

Konferenz

Konferenz28th International Conference on Selected Areas in Cryptography
KurztitelSAC 2021
OrtVirtuell
Zeitraum29/09/211/10/21

ASJC Scopus subject areas

  • Theoretische Informatik
  • Informatik (insg.)

Fingerprint

Untersuchen Sie die Forschungsthemen von „Multi-user Security of the Elephant v2 Authenticated Encryption Mode“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren