On the soundness of authenticate-then-encrypt
- 4 October 2010
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 505-515
- https://doi.org/10.1145/1866307.1866364
Abstract
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where the security properties of the channel are characterized by the capabilities provided at the E-interface. A security mechanism, such as encryption or a message authentication code (MAC), can be seen as the transformation of a certain type of channel into a stronger type of channel, where the term "transformation" refers to a natural simulation-based definition. For example, the main purpose of a MAC can be regarded as transforming an insecure into an authenticated channel, and encryption then corresponds to transforming an authenticated into a fully secure channel; this is the well-known Encrypt-then-Authenticate (EtA) paradigm. In the dual paradigm, Authenticate-then-Encrypt (AtE), encryption first transforms an insecure into a confidential channel, and a MAC transforms this into a secure channel. As pointed out by Bellare and Namprempre, and Krawczyk, there are encryption schemes for which AtE does not achieve the expected guarantees. We highlight two reasons for investigating nevertheless AtE as a general paradigm: First, this calls for a definition of confidentiality; what separates a confidential from a secure channel is its (potential) malleability. We propose the first systematic analysis of malleability for symmetric encryption, which, in particular, allows us to state a generic condition on encryption schemes to be sufficient for AtE. Second, AtE is used in practice, for example in TLS. We show that the schemes used in TLS (stream ciphers and CBC encryption) satisfy the condition. This is consistent with Krawczyk's results on similar instantiations of AtE in game-based models.Keywords
This publication has 20 references indexed in Scilit:
- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition ParadigmJournal of Cryptology, 2008
- Indistinguishability AmplificationPublished by Springer Nature ,2007
- OCBACM Transactions on Information and System Security, 2003
- Relaxing Chosen-Ciphertext SecurityPublished by Springer Nature ,2003
- Indistinguishability of Random SystemsPublished by Springer Nature ,2002
- Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS...Published by Springer Nature ,2002
- Universally Composable Notions of Key Exchange and Secure ChannelsPublished by Springer Nature ,2002
- Analysis of Key-Exchange Protocols and Their Use for Building Secure ChannelsPublished by Springer Nature ,2001
- The Security of the Cipher Block Chaining Message Authentication CodeJournal of Computer and System Sciences, 2000
- Nonmalleable CryptographySIAM Journal on Computing, 2000