Abstract | ||
---|---|---|
Typical AE schemes are supposed to be secure when used as specified. However, they can --- and often do --- fail miserably when used improperly. As a partial remedy, Rogaway and Shrimpton proposed nonce-misuse-resistant AE MRAE and the first MRAE scheme SIV \"Synthetic Initialization Vector\". This paper proposes RIV \"Robust Initialization Vector\", which extends the generic SIV construction by an additional call to the internal PRF. RIV inherits the full security assurance from SIV, but unlike SIV and other MRAE schemes, RIV is also provably secure when releasing unverified plaintexts. This follows a recent line of research on \"Robust Authenticated Encryption\", similar to the CAESAR candidate AEZ. An AES-based instantiation of RIV runs at less than 1.5 cpb on current x64 processors. Unlike the proposed instantiation of AEZ, which gains speed by relying on reduced-round AES, our instantiation of RIV is provably secure under the single assumption of the AES being secure. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/978-3-662-52993-5_2 | FSE |
Keywords | Field | DocType |
Robustness,Subtle authenticated encryption,Provable security | Computer security,Software security assurance,Computer science,Initialization vector,Robustness (computer science),Authenticated encryption,Provable security | Conference |
Volume | ISSN | Citations |
9783 | 0302-9743 | 2 |
PageRank | References | Authors |
0.37 | 38 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Farzaneh Abed | 1 | 88 | 6.67 |
Christian Forler | 2 | 144 | 12.56 |
Eik List | 3 | 111 | 13.70 |
Stefan Lucks | 4 | 1083 | 108.87 |
Jakob Wenzel | 5 | 116 | 9.80 |