Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation

نویسندگان

چکیده

This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence encryption decryption leakage liberal model where all intermediate computations are leaked full only two TBC calls operating long-term secret protected implementationlevel countermeasures. It provides confidentiality guarantees without leakage, standard for single-pass embedding re-keying process bulk its (i.e., birthday under bounded assumption). improves modes relying TBCs n-bit tweaks when instantiated large-tweak like Deoxys-TBC (a CAESAR competition laureate) or Skinny (used by Romulus finalist NIST lightweight crypto competition). Its security maintained multi-user setting.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Leakage-Resilient Mode of Operation

A weak pseudorandom function (wPRF) is a pseudorandom functions with a relaxed security requirement, where one only requires the output to be pseudorandom when queried on random (and not adversarially chosen) inputs. We show that unlike standard PRFs, wPRFs are secure against memory attacks, that is they remain secure even if a bounded amount of information about the secret key is leaked to the...

متن کامل

A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier

We present a novel mode of operation which iterates a compression function f : {0, 1} → {0, 1} meeting a condition b ≥ 2n. Our construction can be viewed as a way of domain extension, applicable to a fixed-input-length PRF (pseudo-random function) fk : {0, 1}b → {0, 1} meeting the condition b ≥ 2n, which yields an arbitrary-inputlength PRF Fk : {0, 1}∗ → {0, 1}. Our construction accomplishes bo...

متن کامل

An Hybrid Mode of Operation

In this paper I propose a tweakable block cipher construction with a mode of operation that combines counter and chaining methods. Using a single key, the direct application of this mode produces unrepeatable message authentication tags.

متن کامل

Adaptive Mode-Control: A Low-Leakage, Power-Efficient Cache Design

With the advent of deep sub-micron circuit technology, the ratio of static-to-dynamic power in on-chip memories has become an increasingly important issue. At the circuit level, designers propose low-leakage SRAM operation modes (i.e., sleep mode or standby mode) and at architecture level, there are increasing interests in how to efficiently integrate such features into the design. In this pape...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2022

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2022.i4.135-162