Cargando…
BBB Secure Nonce Based MAC Using Public Permutations
In the recent trend of CAESAR competition and NIST light-weight competition, cryptographic community have witnessed the submissions of several cryptographic schemes that are build on public random permutations. Recently, in CRYPTO 2019, Chen et al. have initiated an interesting research direction in...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7335002/ http://dx.doi.org/10.1007/978-3-030-51938-4_9 |
_version_ | 1783554048701497344 |
---|---|
author | Dutta, Avijit Nandi, Mridul |
author_facet | Dutta, Avijit Nandi, Mridul |
author_sort | Dutta, Avijit |
collection | PubMed |
description | In the recent trend of CAESAR competition and NIST light-weight competition, cryptographic community have witnessed the submissions of several cryptographic schemes that are build on public random permutations. Recently, in CRYPTO 2019, Chen et al. have initiated an interesting research direction in designing beyond birthday bound PRFs from public random permutations and they proposed two instances of such PRFs. In this work, we extend this research direction by proposing a nonce-based MAC build from public random permutations. We show that our proposed MAC achieves 2n/3 bit security (with respect to the state size of the permutation) and the bound is essentially tight. Moreover, the security of the MAC degrades gracefully with the repetition of the nonce. |
format | Online Article Text |
id | pubmed-7335002 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-73350022020-07-06 BBB Secure Nonce Based MAC Using Public Permutations Dutta, Avijit Nandi, Mridul Progress in Cryptology - AFRICACRYPT 2020 Article In the recent trend of CAESAR competition and NIST light-weight competition, cryptographic community have witnessed the submissions of several cryptographic schemes that are build on public random permutations. Recently, in CRYPTO 2019, Chen et al. have initiated an interesting research direction in designing beyond birthday bound PRFs from public random permutations and they proposed two instances of such PRFs. In this work, we extend this research direction by proposing a nonce-based MAC build from public random permutations. We show that our proposed MAC achieves 2n/3 bit security (with respect to the state size of the permutation) and the bound is essentially tight. Moreover, the security of the MAC degrades gracefully with the repetition of the nonce. 2020-06-06 /pmc/articles/PMC7335002/ http://dx.doi.org/10.1007/978-3-030-51938-4_9 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Dutta, Avijit Nandi, Mridul BBB Secure Nonce Based MAC Using Public Permutations |
title | BBB Secure Nonce Based MAC Using Public Permutations |
title_full | BBB Secure Nonce Based MAC Using Public Permutations |
title_fullStr | BBB Secure Nonce Based MAC Using Public Permutations |
title_full_unstemmed | BBB Secure Nonce Based MAC Using Public Permutations |
title_short | BBB Secure Nonce Based MAC Using Public Permutations |
title_sort | bbb secure nonce based mac using public permutations |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7335002/ http://dx.doi.org/10.1007/978-3-030-51938-4_9 |
work_keys_str_mv | AT duttaavijit bbbsecurenoncebasedmacusingpublicpermutations AT nandimridul bbbsecurenoncebasedmacusingpublicpermutations |