{"title":"Lightweight Yet Nonce-Misuse Secure Authenticated Encryption for Very Short Inputs","authors":"Alexandre Adomnicăi;Kazuhiko Minematsu;Junji Shikata","doi":"10.1109/JIOT.2024.3481033","DOIUrl":null,"url":null,"abstract":"We study authenticated encryption (AE) modes dedicated to very short messages, which are crucial for Internet of Things applications. One of the most popular class of AE is built on block ciphers, namely a mode of operation. The computational cost of a mode is typically measured by its rate, indicating the number of input blocks processed per block cipher call in asymptotic terms. While certain modes demonstrate efficiency in terms of rate, such as <inline-formula> <tex-math>$\\mathsf { OCB}$ </tex-math></inline-formula>, this metric does not always accurately portray the total computational burden as it ignores overhead. Consequently, modes efficient in terms of rate may not always perform optimally with short messages. This observation motivates us to study modes that are efficient on short inputs rather than focusing on rate. Since the existing general-purpose AE modes need at least three block cipher calls for nonempty messages, we explore the design space for AE modes that use at most two calls. We propose a family of AE modes, dubbed <inline-formula> <tex-math>$ \\mathsf {Manx}$ </tex-math></inline-formula>, which work when the total input length is less than <inline-formula> <tex-math>$2n$ </tex-math></inline-formula> bits, using an n-bit block cipher. Notably, the second construction of <inline-formula> <tex-math>$ \\mathsf {Manx}$ </tex-math></inline-formula> can encrypt almost n-bit plaintexts and saves one or two block cipher calls compared to standard modes, such as <inline-formula> <tex-math>$\\mathsf { GCM}$ </tex-math></inline-formula> or <inline-formula> <tex-math>$\\mathsf { OCB}$ </tex-math></inline-formula>, while preserving comparable provable security. In addition to the conventional security against nonce-respecting adversary, we prove that <inline-formula> <tex-math>$ \\mathsf {Manx}$ </tex-math></inline-formula> have security against nonce-misusing adversary with a different security level for each family member. We also present benchmarks on popular 8/32-bit microprocessors, namely 8-bit AVR, 32-bit ARM Cortex-M0, and ARM Cortex-M4, using AES and lightweight block ciphers. Our results show the clear advantage of <inline-formula> <tex-math>$ \\mathsf {Manx}$ </tex-math></inline-formula> over the previous modes for such short messages. In particular, <inline-formula> <tex-math>$ \\mathsf {Manx2}$ </tex-math></inline-formula> has significant performance gain from the existing representative schemes thanks to the simple structure and parallelizability. For example, using AES-128, <inline-formula> <tex-math>$ \\mathsf {Manx2}$ </tex-math></inline-formula> is faster than <inline-formula> <tex-math>$\\mathsf { OCB}$ </tex-math></inline-formula> by a factor of 1.5 to 1.7 to process a 64-bit nonce and a 120-bit plaintext.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 3","pages":"2807-2824"},"PeriodicalIF":8.9000,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10745525","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10745525/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
We study authenticated encryption (AE) modes dedicated to very short messages, which are crucial for Internet of Things applications. One of the most popular class of AE is built on block ciphers, namely a mode of operation. The computational cost of a mode is typically measured by its rate, indicating the number of input blocks processed per block cipher call in asymptotic terms. While certain modes demonstrate efficiency in terms of rate, such as $\mathsf { OCB}$ , this metric does not always accurately portray the total computational burden as it ignores overhead. Consequently, modes efficient in terms of rate may not always perform optimally with short messages. This observation motivates us to study modes that are efficient on short inputs rather than focusing on rate. Since the existing general-purpose AE modes need at least three block cipher calls for nonempty messages, we explore the design space for AE modes that use at most two calls. We propose a family of AE modes, dubbed $ \mathsf {Manx}$ , which work when the total input length is less than $2n$ bits, using an n-bit block cipher. Notably, the second construction of $ \mathsf {Manx}$ can encrypt almost n-bit plaintexts and saves one or two block cipher calls compared to standard modes, such as $\mathsf { GCM}$ or $\mathsf { OCB}$ , while preserving comparable provable security. In addition to the conventional security against nonce-respecting adversary, we prove that $ \mathsf {Manx}$ have security against nonce-misusing adversary with a different security level for each family member. We also present benchmarks on popular 8/32-bit microprocessors, namely 8-bit AVR, 32-bit ARM Cortex-M0, and ARM Cortex-M4, using AES and lightweight block ciphers. Our results show the clear advantage of $ \mathsf {Manx}$ over the previous modes for such short messages. In particular, $ \mathsf {Manx2}$ has significant performance gain from the existing representative schemes thanks to the simple structure and parallelizability. For example, using AES-128, $ \mathsf {Manx2}$ is faster than $\mathsf { OCB}$ by a factor of 1.5 to 1.7 to process a 64-bit nonce and a 120-bit plaintext.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.