Forgery on Stateless Cmcc with a Single Query
نویسنده
چکیده
We present attacks against CMCC that invalidate the claimed security of integrity protection and misuse resistance. We exploit the fact zeropadding is used on both the message and authenticated data and demonstrate how one may generate a forgery with a single call to the encryption oracle. From this we calculate the ciphertext of the chosen message, yielding a forgery and so breaking INT-CTXT. In the nonce-reuse setting, existence of a forgery leads directly to a 2-query distinguisher. 1. Description of Stateless CMCC CBC-Mac-Counter-CBC[5] (henceforth CMCC) is a CAESAR[1] submission, and comes in both stateful and stateless forms. In this note we consider the stateless version, which is the recommended con guration, and demonstrate a weakness in the mode of operation itself. As such, our attacks holds across all stateless parameter sets, irrespective of the choice of primitives. 1.1. Notation. Following the original paper, let B be the blocksize in bits,τ the number of authenticity bits and N a Public Message Number which must be a nonce, with recommended values (B, τ, |N |) = (128, 64, 32). No secret message number is used in the stateless version. Let ⊕ and || denote respectively the xor and concatenation of two strings. Constant bytes are provided in hexadecimal and typeset in typewriter font (eg 0xB6). Finally, 0 is the string of α zero bits. Whilst all lengths will be given in bits, as per submission requirements[1] they shall all be exact number of bytes, and thus multiples of 8. Where appropriate, EK represents an encryption oracle, whilst CMCCK is the CMCC encryption function under key K. 1.2. Components. For clarity of notation, we will describe CMCC in terms of the following well known components, each instantiated with an appropriate blockcipher (for which the recommendation is aes): • Let Padb(M) be the function that returns bitstring M padded up to b bits by appending su ciently many zero bits. • Let MSBb(M) be the Most Signi cant Bits function, returning bitstring M truncated to the rst b bits. • Let Ek(m) be the encryption of a single block m with key k using the block cipher. • Let CBCk (M) be the cipher block chaining mode[3] encryption of message M under key k and initial value N . • Let MACk (M) be an unforgable MAC on message M under key k and with initial value N . The recommended instantiation is AES-CMAC[4].
منابع مشابه
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC, an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse resistant. The main focus for this work is minimizing ciphertext expansion, especially for short messages including plaintext lengths less than the underlying block c...
متن کاملTowards stateless, client-side driven Cross-Site Request Forgery protection for Web applications
Cross-site request forgery (CSRF) is one of the dominant threats in the Web application landscape. In this paper, we present a lightweight and stateless protection mechanism that can be added to an existing application without requiring changes to the application’s code. The key functionality of the approach, which is based on the double-submit technique, is purely implemented on the client-sid...
متن کاملCryptanalysis of some first round CAESAR candidates
ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES _ CMCCv₁ with the complexity of two queries and the success ...
متن کاملPerformance evaluation of block-based copy- move image forgery detection algorithms
Copy-move forgery is a particular type of distortion where a part or portions of one image is/are copied to other parts of the same image. This type of manipulation is done to hide a particular part of the image or to copy one or more objects into the same image. There are several methods for detecting copy-move forgery, including block-based and key point-based methods. In this paper, a method...
متن کاملDetection of Copy-Move Forgery in Digital Images Using Scale Invariant Feature Transform Algorithm and the Spearman Relationship
Increased popularity of digital media and image editing software has led to the spread of multimedia content forgery for various purposes. Undoubtedly, law and forensic medicine experts require trustworthy and non-forged images to enforce rights. Copy-move forgery is the most common type of manipulation of digital images. Copy-move forgery is used to hide an area of the image or to repeat a por...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014