@inproceedings{d74af0d0cca44a108811ccb16f87585e,
title = "Multi-user Security of the Elephant v2 Authenticated Encryption Mode",
abstract = "One of the finalists in the NIST Lightweight Cryptography competition is Elephant v2, a parallelizable, permutation-based authenticated encryption scheme. The original first/second-round submission Elephant v1/v1.1 was proven secure against nonce-respecting adversaries in the single-user setting. For the final round, the mode has undergone certain subtle modifications, the most important one being a change in the authentication portion of the mode. These changes require a new dedicated security proof. In this work, we prove the security of the Elephant v2 mode. First of all, our proof shows that Elephant v2 is indeed a secure authenticated encryption scheme and that its security against nonce-respecting adversaries is on par with that of Elephant v1/v1.1. In addition, our security analysis is in the multi-user setting and demonstrates that Elephant v2 fares well if multiple devices use Elephant v2 with independent keys. Moreover, our proof shows that Elephant v2 even ensures authenticity under nonce misuse.",
keywords = "Authenticated encryption, Elephant, Lightweight, Multi-user security, Nonce-misuse",
author = "Tim Beyne and Chen, {Yu Long} and Dobraunig, {Christoph Erwin} and Bart Mennink",
year = "2022",
doi = "10.1007/978-3-030-99277-4_8",
language = "English",
isbn = "9783030992767",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "155--178",
editor = "Riham AlTawy and Andreas H{\"u}lsing",
booktitle = "Selected Areas in Cryptography - 28th International Conference, Revised Selected Papers",
note = "28th International Conference on Selected Areas in Cryptography : SAC 2021, SAC 2021 ; Conference date: 29-09-2021 Through 01-10-2021",
}