64 research outputs found
Security Analysis of DRBG Using HMAC in NIST SP 800-90
HMAC_DRBG is a deterministic random bit generator using
HMAC specified in NIST SP 800-90. The document claims that
HMAC_DRBG is a pseudorandom bit generator if HMAC is a pseudorandom
function. However, no proof is given in the document. This article
provides a security analysis of HMAC_DRBG and confirms the claim
A Formal Treatment of Envelope Encryption
Envelope encryption is a method to encrypt data with two distinct keys in its basic form. Data is first encrypted with a data-encryption key, and then the data-encryption key is encrypted with a key-encryption key. Despite its deployment in major cloud services, as far as we know, envelope encryption has not received any formal treatment. To address this issue, we first formalize the syntax and security requirements of envelope encryption in the symmetric-key setting. Then, we show that it can be constructed by combining encryptment and authenticated encryption with associated data (AEAD). Encryptment is one-time AEAD satisfying that a small part of a ciphertext works as a commitment to the corresponding secret key, message, and associated data. Finally, we show that the security of the generic construction is reduced to the security of the underlying encryptment and AEAD
A Tweak for a PRF Mode of a Compression Function and Its Applications
We discuss a tweak for the domain extension called Merkle-Damgård
with Permutation (MDP), which was presented at ASIACRYPT 2007.
We first show that MDP may produce multiple independent pseudorandom
functions (PRFs) using a single secret key and multiple permutations
if the underlying compression function is a PRF against related-key
attacks with respect to the permutations.
Using this result, we then construct a hash-function-based MAC function,
which we call FMAC, using a compression function as its underlying primitive.
We also present a scheme to extend FMAC so as to take as input a
vector of strings
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
Facebook introduced message franking to enable users to report abusive content verifiably in end-to-end encrypted messaging. Grubbs et al. formalized the underlying primitive called compactly committing authenticated encryption with associated data (ccAEAD) and presented schemes with provable security. Dodis et al. proposed a core building block called encryptment and presented a generic construction of ccAEAD with encryptment and standard AEAD. This paper first proposes to use a tweakable block cipher instead of AEAD for the generic construction of Dodis et al. In the security analysis of the proposed construction, its ciphertext integrity is shown to require a new but feasible assumption on the ciphertext integrity of encryptment. Then, this paper formalizes remotely keyed ccAEAD (RK ccAEAD) and shows that the proposed construction works as RK ccAEAD. Finally, the confidentiality of the proposed construction as RK ccAEAD is shown to require a new variant of confidentiality for encryptment. The problem of remotely keyed encryption was posed by Blaze in 1996. It is now related to the problem of designing a cryptographic scheme using a trusted module and/or with leakage resiliency
Verified Correctness and Security of mbedTLS HMAC-DRBG
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A),
and we have proved its cryptographic security--that its output is
pseudorandom--using a hybrid game-based proof. We have also proved that the
mbedTLS implementation (C program) correctly implements this functional
specification. That proof composes with an existing C compiler correctness
proof to guarantee, end-to-end, that the machine language program gives strong
pseudorandomness. All proofs (hybrid games, C program verification, compiler,
and their composition) are machine-checked in the Coq proof assistant. Our
proofs are modular: the hybrid game proof holds on any implementation of
HMAC-DRBG that satisfies our functional specification. Therefore, our
functional specification can serve as a high-assurance reference.Comment: Appearing in CCS '1
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules
SHA-0 employs a primitive polynomnial of degree 16 over GF(2) in its message schedule. There are 2048 primitive polynomials of degree 16 over GF(2). For each primitive polynomial, a SHA-0 variant can be constructed. In this paper, the security of 2048 variants is analyzed against the Chabaud-Joux attack proposed in CRYPTO\u2798. The analysis shows that all the variants could be collision-attacked by using near-collisions as a tool and thus the replacement of the primitive polynomial is not a proper way to make SHA-0 secure. However, it is shown that the selection of the variants highly affects the complexity of the attack. Furthermore, a collision in the most vulnerable variant is presented. It is obtained by the original Chabaud-Joux attack without any improvements
A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications
This paper discusses a mode for pseudorandom functions (PRFs) based on the hashing mode of Lesamnta-LW and the domain extension called Merkle-Damgård with permutation (MDP). The hashing mode of Lesamnta-LW is a plain Merkle-Damgård iteration of a block cipher with its key size half of its block size. First, a PRF mode is presented which produces multiple independent PRFs with multiple permutations and initialization vectors if the underlying block cipher is a PRP. Then, two applications of the PRF mode are presented. One is a PRF with minimum padding. Here, padding is said to be minimum if the produced message blocks do not include message blocks only with the padded sequence for any non-empty input message. The other is a vector-input PRF using the PRFs with minimum padding.This work was supported in part by JSPS KAKENHI GrantNumber JP16H02828.IEICE Transactions Online TOP (https://search.ieice.org/
Scratch test of TiCN thin films with different preferred orientation
The purpose of this study is to examine the effect of crystallite preferred orientation on the mechanical strength of TiCN thin films in highly compressive residual stress. TiCN thin films were deposited by PVD on JIS-SKH55 (AISI M35) steel. The applied substrate bias voltages were set for -50, -80, -100,-120 and -150V. Subsequently, residual stress and crystalline preferred orientation of these specimens were investigated by X-ray diffraction methodology. The crystalline preferred orientation in thin films was evaluated by the ODF calculated from pole figures. On the other hand, dynamic hardness test (DH) and scratch test were executed to evaluate the mechanical strength of thin films. In our study, it was observed that negative bias voltages had an effect on the preferred orientation. The orientation density at -120 V was the highest of all specimens. In addition, the value of scratch section area at -120V was the largest of all specimens. As a conclusion, the relation between the scratch area and the negative bias voltages corresponded to the relation between the preferred orientation and the bias voltages
- …