Multi-user Security of the Elephant v2 Authenticated Encryption Mode

Tim Beyne, Yu Long Chen, Christoph Erwin Dobraunig*, Bart Mennink

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung


One of the finalists in the NIST Lightweight Cryptography competition is Elephant v2, a parallelizable, permutation-based authenticated encryption scheme. The original first/second-round submission Elephant v1/v1.1 was proven secure against nonce-respecting adversaries in the single-user setting. For the final round, the mode has undergone certain subtle modifications, the most important one being a change in the authentication portion of the mode. These changes require a new dedicated security proof. In this work, we prove the security of the Elephant v2 mode. First of all, our proof shows that Elephant v2 is indeed a secure authenticated encryption scheme and that its security against nonce-respecting adversaries is on par with that of Elephant v1/v1.1. In addition, our security analysis is in the multi-user setting and demonstrates that Elephant v2 fares well if multiple devices use Elephant v2 with independent keys. Moreover, our proof shows that Elephant v2 even ensures authenticity under nonce misuse.

TitelSelected Areas in Cryptography - 28th International Conference, Revised Selected Papers
UntertitelSAC 2021
Redakteure/-innenRiham AlTawy, Andreas Hülsing
Herausgeber (Verlag)Springer
ISBN (elektronisch)978-303099276-7
ISBN (Print)9783030992767
PublikationsstatusVeröffentlicht - 2022
Extern publiziertJa
Veranstaltung28th International Conference on Selected Areas in Cryptography: SAC 2021 - Virtuell, Kanada
Dauer: 29 Sept. 20211 Okt. 2021


NameLecture Notes in Computer Science
Herausgeber (Verlag)Springer Verlag
ISSN (Print)0302-9743


Konferenz28th International Conference on Selected Areas in Cryptography
KurztitelSAC 2021

ASJC Scopus subject areas

  • Theoretische Informatik
  • Allgemeine Computerwissenschaft


Untersuchen Sie die Forschungsthemen von „Multi-user Security of the Elephant v2 Authenticated Encryption Mode“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren