Characterization of EME with Linear Mixing

Similar documents
ZCZ: Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls

Modes of Operations for Wide-Block Encryption

EME : extending EME to handle arbitrary-length messages with associated data

Improving Upon the TET Mode of Operation

Tweakable Enciphering Schemes From Stream Ciphers With IV

A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random Permutation

A Domain Extender for the Ideal Cipher

Improved Security Analysis for OMAC as a Pseudo Random Function

A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1

Fast and Secure CBC-Type MAC Algorithms

A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs

Provable Security in Symmetric Key Cryptography

A Pseudo-Random Encryption Mode

Modern Cryptography Lecture 4

CPA-Security. Definition: A private-key encryption scheme

ECS 189A Final Cryptography Spring 2011

The Indistinguishability of the XOR of k permutations

1 Cryptographic hash functions

CTR mode of operation

Symmetric Encryption

On the Round Security of Symmetric-Key Cryptographic Primitives

1 Cryptographic hash functions

A survey on quantum-secure cryptographic systems

Solution of Exercise Sheet 7

Improved security analysis of OMAC

CSA E0 235: Cryptography (19 Mar 2015) CBC-MAC

On the Security of Hash Functions Employing Blockcipher Post-processing

Studies on Disk Encryption

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3

Parallelizable and Authenticated Online Ciphers

On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited

Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC

CPSC 467: Cryptography and Computer Security

Cryptography: The Landscape, Fundamental Primitives, and Security. David Brumley Carnegie Mellon University

Block Ciphers/Pseudorandom Permutations

CS 6260 Applied Cryptography

Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions

Security of Random Feistel Schemes with 5 or more Rounds

A Parallelizable Enciphering Mode

Lecture 5, CPA Secure Encryption from PRFs

A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT

DD2448 Foundations of Cryptography Lecture 3

III. Pseudorandom functions & encryption

Security Analysis of Key-Alternating Feistel Ciphers

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

Foundation of Cryptography, Lecture 4 Pseudorandom Functions

Revisiting Variable Output Length XOR Pseudorandom Function

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding

CPSC 91 Computer Security Fall Computer Security. Assignment #3 Solutions

Integrity Analysis of Authenticated Encryption Based on Stream Ciphers

Lecture 7: CPA Security, MACs, OWFs

Lecture 5: Pseudorandom functions from pseudorandom generators

Pipelineable On-Line Encryption

The Pseudorandomness of Elastic Block Ciphers

CSA E0 235: Cryptography March 16, (Extra) Lecture 3

Benes and Butterfly schemes revisited

Authenticated Encryption Mode for Beyond the Birthday Bound Security

Construction of universal one-way hash functions: Tree hashing revisited

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding

CS 6260 Applied Cryptography

Notes for Lecture A can repeat step 3 as many times as it wishes. We will charge A one unit of time for every time it repeats step 3.

Tight Security Analysis of EHtM MAC

The Random Oracle Model and the Ideal Cipher Model are Equivalent

On the Security of CTR + CBC-MAC

Lecture Summary. 2 Simplified Cramer-Shoup. CMSC 858K Advanced Topics in Cryptography February 26, Chiu Yuen Koo Nikolai Yakovenko

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1

Block ciphers And modes of operation. Table of contents

Provable Security of Substitution-Permutation Networks

The Random Oracle Model and the Ideal Cipher Model are Equivalent

Provable-Security Approach begins with [GM82] Classical Approach. Practical Cryptography: Provable Security as a Tool for Protocol Design

Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod. Assignment #2

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Improved indifferentiability security analysis of chopmd Hash Function

An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher

Quantum Chosen-Ciphertext Attacks against Feistel Ciphers

Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs

Adaptive Security of Compositions

Pr[C = c M = m] = Pr[C = c] Pr[M = m] Pr[M = m C = c] = Pr[M = m]

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

ON CIPHERTEXT UNDETECTABILITY. 1. Introduction

Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R)

Breaking the FF3 Format Preserving Encryption

From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited

Efficient Length Doubling From Tweakable Block Ciphers

Computer Science A Cryptography and Data Security. Claude Crépeau

Towards Understanding the Known-Key Security of Block Ciphers

Impact of ANSI X9.24 1:2009 Key Check Value on ISO/IEC :2011 MACs

SYMMETRIC ENCRYPTION. Syntax. Example: OTP. Correct decryption requirement. A symmetric encryption scheme SE = (K, E, D) consists of three algorithms:

Introduction to Cryptology. Lecture 2

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

Breaking and Repairing GCM Security Proofs

AES-OTR v3. Designer/Submitter: Kazuhiko Minematsu (NEC Corporation, Japan) Contact Address:

Perfectly-Secret Encryption

Lecture 11: Non-Interactive Zero-Knowledge II. 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian problem

The Sum of PRPs is a Secure PRF

Lecture 9 Julie Staub Avi Dalal Abheek Anand Gelareh Taban. 1 Introduction. 2 Background. CMSC 858K Advanced Topics in Cryptography February 24, 2004

Lecture 10 - MAC s continued, hash & MAC

Stronger Security Variants of GCM-SIV

Transcription:

Characterization of EME with Linear Mixing Nilanjan Datta and Mridul Nandi Cryptology Research Group Applied Statistics Unit Indian Statistical Institute 03, B.T. Road, Kolkata, India 700108 nilanjan isi jrf@yahoo.com, mridul.nandi@gmail.com Abstract. Encrypt-Mix-Encrypt is a type of SPRP based construction, where a masked plaintext is encrypted in ECB mode of, then a non-linear mixing is performed and then again an encryption is performed in ECB mode which is masked to produce the ciphertext. Using the property of the binary field, the authors proved that the construction is not SPRP secure if the mixing used is linear. In this paper, we observe that relaxing the mixing operation to some specific efficient linear mixing provides the PRP property of the construction. Moreover choosing a linear mixing that gives the online property is not a difficult task. We can use this fact to construct an efficient Online PRP using Encrypt-Mix-Encrypt type of construction with the mix operation being a linear online mixing, making the construction efficient and online. We also show that the construction with linear mixing doesn t provide SPRP security even if we perform all the operations in a prime field instead of binary field. Thus, we fully characterize EME with linear mixing. Keywords: EME, PRP, OLPRP, Lmix, OLmix. 1 Introduction EME [3] is a block-cipher mode of operation, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m [1..n]. The mode is parallelizable, but as serial-efficient as the non-parallelizable mode CMC [7]. EME algorithm entails two layers of ECB encryption and a nonlinear mixing in between. EME is proved to provide SPRP [4] security in the standard, provable security model assuming that the underling block cipher is SPRP secure. The authors showed that, if the construction uses liner mix, instead of non-linear mixing then an SPRP attack can be mounted using the properties of an binary field. 1.1 Motivation and Our Contribution. Motivation of this paper is to fully characterise EME with linear mixing (instead of non-linear mixing). We know there exist attacks against the SPRP security of EME with linear mixing but we don t have any idea about the PRP [4]

Nilanjan Datta and Mridul Nandi or OLPRP security of the construction. In this paper, we observe that some specific efficient linear mixing (respectively Online linear mixing) still retains the PRP (resp. OLPRP) property of the construction. In fact, we showed that, the necessary as well as sufficient condition for EME with linear mixing to have the PRP and OLPRP security, is to use a particular type of linear mixing : Lmix and OLmix respectively. Moreover, we prove that any other linear mixing except Lmix and OLmix, doesn t provide the PRP and OLPRP security respectively. Thus, we fully characterize EME with linear mixing. We can use this fact to construct an efficient PRP (or OLPRP) using Encrypt-Mix-Encrypt type of construction with linear (online) mixing. Moreover, we prove that EME with any linear mixing doesn t provide SPRP security, not just in the binary field (As shown by the authors of EME) but also in any other field. 1. Application of our Result. Modern cryptography community put a lot of efforts of designing different Authenticated Encryptions. Lack of being standardized of this notion motivates to make a call for CEASER standard of Authenticated Encryption [8, 9, 10]. For that, various new authenticated encryption designs have been proposed recently. We know that, for constructing an Authenticated Encryption, it is not necessary to be a SPRP construction, rather a PRP construction (not length preserving) with properly generated tag, is good enough to give an Authenticated Encryption. So, using our result one can efficiently construct an authenticated Encryption using EME with Lmix and then properly generating the tag. For online secure Authenticated Encryption, one can use EME with OLmix as the basis of the construction. Such constructions are very efficient as it doesn t use any non-linear functions and the mode is parallelizable. Infact some of the existing constructions like ELmE [] and COPA [1] uses this kind of structure (EME with Olmix) as the underlying structure to make the construction online, fully pipelined implementable. 1.3 Outline of the paper In this paper we have observed that if we use linear mixing with certain properties in EME, then the privacy security of the construction still holds. After providing basic preliminaries in section, we define two types of linear mixing - online linear mixing and full linear mixing that can be used in the mixing part of EME. Then in section 3, using the well known Interpolation technique and Patarin s H Coefficient [5] method, we prove that those two mixing provides PRP and OLPRP security of EME respectively. Finally in section 4, we show the SPRP attack against the generalized EME construction with linear mixing that works for any fields. Finally we conclude along with some possible future works.

Characterization of EME with Linear Mixing 3 Preliminaries.1 Security Measures Given an adversary A (w.o.l.g. throughout the paper we assume a deterministic adversary) and two functions f and g, we define the distinguishing advantage of A distinguishing f from g. More formally, Adv f g (A) = Pr[A f = 1] Pr[A g = 1]. In this paper, we give a particularly strong definition of privacy, one asserting indistinguishability from random strings. Consider an adversary A who has access of one of two types of oracles: a real encryption oracle or an ideal encryption oracle. A real encryption oracle, F K, takes as input M and returns C = F K (M). Whereas an ideal encryption oracle $ returns a random string R with R = M, for every fresh message M. Given an adversary A and an encryption scheme F, we define the prp-advantage of A by the distinguishing advantage of A distinguishing F from $. More formally, Adv prp F (A) := Adv$ F (A) = Pr K [A F K = 1] Pr $ [A $ = 1]. Similarly, we define the olprp-advantage of A for which the the ideal online encryption oracle $ ol responses random string keeping the online property. The online privacy advantage of an adversary A against F is defined as Adv olprp F (A) := Adv $ ol F (A). A more strong definition of security is given by the sprp notion which is similar to the prp notion except that the adversary has the power of a accessing decryption oracle as well. Formally, Adv sprp F (A) = Pr K [A F K,F 1 K = 1] Pr$ [A $,$ 1 = 1].. View and A-realizable We define view of a deterministic adversary A interacting with an oracle O by a tuple τ(a O ) := (Q 1, R 1,..., Q q, R q ) where Q i is the i th query and R i is the response by O. It is also called O-view. A tuple τ = (Q 1, R 1,..., Q q, R q ) is called A-realizable if it makes query Q i after obtaining all previous responses R 1,..., R i 1. As A is assumed to be deterministic, given R 1,..., R q, there is an unique q-tuple Q 1,..., Q q for which the combined tuple is A-realizable. Now we describe the popular coefficient H-technique which can be used to bound distinguish advantage. Suppose f and g are two oracles and V denotes all possible A-realizable views while A interacts with f or g (they have same input and output space). Lemma 1 (Coefficient H Technique [5, 6]). If v V good V (as defined above), Pr[τ(A g ) = v] (1 ɛ)pr[τ(a f ) = v], then the distinguishing advantage Adv f g (A) of A is at most ɛ + Pr[τ(A f ) V good ].

4 Nilanjan Datta and Mridul Nandi Proof. Here we calculate the advantage of any adversary A distinguishing two random online functions f and g. Adv f g (A) = Pr[A f = 1] Pr[A g = 1] = v V (Pr[τ(A f ) = v] Pr[τ(A g ) = v]) = v V V good (Pr[τ(A f ) = v] Pr[τ(A g ) = v]) + v V \V good (Pr[τ(A f ) = v] Pr[τ(A g ) = v]) = ɛ + Pr[τ(A f ) / V good ].3 Consistent Collision Relations for a Linear Function Assume, B = {0, 1} n. An l-tuple x B l is denoted by (x[1], x[],..., x[l]). We call l := x block-length of x. For 0 a b < l we denote x[a..b] := (x[a], x[a + 1],..., x[b]), x[..b] = x[1..b]. Suppose X = X[1..r 1 ] is a r 1 -tuple of variables of B and L : B r 1 B r is a linear function. We denote Y = L(X) which is an r -tuple of variables from B. Let γ 1 and γ are two equivalence relations defined on the sets respectively [1..r 1 ] and [1..r ]. Let X γ 1 denote the tuple of variables which satisfies the collision relation γ 1 by replacing identical variables by the variable which occurred with minimum index. We say that (γ 1, γ ) is consistent with L if L i (X γ ) L j (X γ 1 ) if and only if i and j are related in γ. Clearly, given any γ 1 and L there is exactly one γ for which (γ 1, γ ) is consistent with L. We write γ 1 L γ. Example 1. If γ 1 = {{1, 3}, {}, {4, 6}, {5}} for r 1 = 6, then we write X γ 1 = (X 1, X, X 1, X 4, X 5, X 4 ). Let L map into three variables (i.e., r = 3 such that L 1 = X 1 + X + X 3 + X 6, L = X 4 + X 5 + X 6 and L 3 = X + X 4 then L 1 (X γ 1 ) = L 3 (X γ 1 ) = X + X 4 and L (X γ 1 ) = X 5 (we work it here in binary field). So γ 1 L γ where γ = {{1, 3}, {}}. Lemma. [Number of Solutions for Consistent relations] Let (γ 1, γ ) be consistent with L : B r 1 B r then {X : Coll(X) = γ 1, Coll(L(X)) = γ } ns 1 (1 s n+1 ) where s 1 and s denote the number of equivalence classes of γ 1 and γ respectively and s = s 1 + s. Proof. Let Y = L(X). Because of consistency, for all related i, j in γ, Y i = Y j. There may be additional equality which must be avoided. For all unrelated pair (i, j) in γ we must choose X in a manner such that Y i Y j and similarly for

Characterization of EME with Linear Mixing 5 all unrelated pair (i, j) in γ 1 we have X i X j. Due to consistency, any one can happen for at most n(s 1 1) many X s as L i (X γ 1 ) = L j (X γ 1 ) gives a non-trivial equation. So the result follows as we have at most ( s ) such equalities. 3 EME mix : A General Form of EME with Linear Mixing The construction EME mix is a variant of EME, where linear mixing function mix is used instead of non-linear mixing. Other than the mixing part, the construction remains same as EME. For a message M of length is l, the construction is described below. Here E K : F F is a block cipher that maps a field element to another. Here possible choices of F is GF ( n ) or GF (p n ) where p is a prime. Although we don t have any blockcipher with F = GF (p n ) but we keep it for theoretical importance. M[1] M[] M[l] L MM[1] L MM[1] l 1 L MM[l] E K E K E K X[1] X[] X[l] Linear Mixing Function mix Y [1] Y [] Y [l] E K E K E K L CC[1] L CC[] l 1 L CC[l] C[1] C[] C[l] Fig. 3.1. (Encrypt-Mix-Encrypt Construction Layer-1 (Input Masking Layer): MM[j] = M[j] + j 1 L, 1 j l. Layer- (1st Encrypt Layer) : X[j] = E K (MM[j]), 1 j l. Layer-3 (Linear Mix Layer) : Y = mix(x). Layer-4 (nd Encrypt Layer) : CC[j] = E K (Y [j]), 1 j l. Layer-5 (Output Masking Layer) : C[j] = CC[j] + j 1 L, 1 j l. Now, the main focus is on the linear mix function mix. The linear function mix is obtained via a matrix multiplication as given below :

6 Nilanjan Datta and Mridul Nandi Y [1] Y [l] Y = mix(x) = ( B ). ( X ) b 11 b 1 b 1l = b 1 b b l b l1 b l b ll X[1] X[l] where B is an (l l) invertible matrix. The invertibility property is required to ensure that the decryption is possible. The inverse matrix of B is denoted by A (l l) We are typically interested in two types of mixing functions - Online linear mixing function OLmix and full linear mixing function Lmix, described below : 1. Lmix: It is the mix function for which B is a full matrix i.e. all the entries of matrix B is non-zero.. OLmix: It is the mix function where B is a lower triangular matrix with all it s lower triangular entries nonzero. In the following sections, we ll show that the necessary and sufficient condition for an EME mix to obtain full security is to have Lmix as the mix function and OLmix to obtain the online security. 4 Security of EME Lmix and EME OLmix The main two results that we have proved in this paper is given below. Theorem 1. The distinguishing advantage of an adversary D, distinguishing EME OLmix (EME with linear mix property ) encryption and decryption from $, which is capable of making at most q distinct queries, is bounded by, Adv olprp EME OLmix (D) where s is the no. of distinct non-prefixed blocked queried. Theorem. The distinguishing advantage of an adversary D, distinguishing EME Lmix (EME with linear mix property 1) encryption from $, which is capable of making at most q distinct queries, is bounded by, 5s n Adv prp EME Lmix (D) where σ is total length of all the q queries, made by the adversary. Proof. We prove theorem 1 by applying proposition 1 and 3 in Patarin s H- coefficient technique and theorem by using proposition and 4 in Patarin s H-Coefficient technique. 5σ n

Characterization of EME with Linear Mixing 7 Proof Idea. Here we give the proof idea of theorem 1. The basic idea is as follows : We first define good online views, where two ciphertext blocks are equal iff their corresponding messages upto that block is identical. We ll show that in case of ideal online cipher, generating such a good online view has very high probability. We call L is Valid, if the value of L ensures the collision relation of M and MM and collision relation of C and CC are same. We prove that, with very high probability L is valid. As permutations preserve collision relations, a valid L ensures that the collision relation of M and X are same and collision relation of C and Y are same. Then, using consistent collision relations for linear functions, we show that with very high probability, the collision relation of Y and OLmix(X) is same. Thus for a fixed valid L, the conditional interpolation probability is very high for the construction. Now, applying the two results : High probability of obtaining a good online view and high interpolation probability of EME OLmix for good online views, in Patarin s H-Coefficient technique, we have the Online PRP security of EME OLmix. We use exactly similar idea for the theorem. 4.1 Notation Setup and Definitions Let A be an adversary which makes q queries M i and obtains responses C i, 1 i q. We denote M i = C i = l i. Let σ = q i=1 l i. The first part follows directly from the coefficient H technique (see Lemma 1 and following Propositions 1 and. For this, we first need to define a set of good views V good which would be applied in the proposition. We denote (M 1,..., M q ) by τ in. We assume that all M i s are distinct. Definition 1 (Good Online Views). A ciphertext tuple τ out = (C 1,..., C q ) (also the complete view τ = (τ in, τ out )) is called good online view (belongs to τ good ) w.r.t. τ in if (τ in, τ out ) is an online view (i.e., it must be realized by an online cipher, see section ) and the following condition hold: C i [j] = C i [j] M i [..j] = M i [..j] The condition says that we can have collision of ciphertext blocks in a position only if they are ciphertexts of two messages with same prefixes up to that block. Definition (Good Views). A ciphertext tuple τ out = (C 1,..., C q ) (also the complete view τ = (τ in, τ out )) is called good view (belongs to τ good ) w.r.t. τ in if (τ in, τ out ) is a view and the following condition hold: C i [j] C i [j] The condition says that we don t have any collision in ciphertext blocks. Collision Relation. Consider the following relations, defined on a good view τ. Let γ 1 and γ are collision relations defined on the set {(i, j) : i q, j l i }. A pair ((i, j), (i, j )) is related in γ 1 if j = j and M i [j] = M i [j]. On the other hand, the pair ((i, j), (i, j )) is related in γ if j = j and C i [j] = C i [j]. All

8 Nilanjan Datta and Mridul Nandi other pairs are unrelated. Let the no. of equivalence class of γ i be s i, i = 1,. Note that s = s, the number of prefixes of M i containing at least one message block. Lemma 3. The collision relations defined as above is consistent with OLmix and Lmix. Proof. Let Y = (Y 1 := OLmix(X 1 ),..., Y q := OLmix(X q )). Since the view is good online, C i [j] = C i [j] can happen if M i [..j] = M i [..j]. In this case, clearly, Y i [j] = Y i [j]. Now for any other pair ((i, j), (i, j )), it is easy to see that OLmix function leads to a non-trivial equation OLmix j (X γ 1 i ) = OLmix j (X γ 1) i.e. j b jk X i [k] = k=1 b j kx i [k]. Similarly, it is easy to see that, for Lmix, any pair ((i, j), (i, j )), Lmix function leads to a non-trivial equation Lmix j (X γ 1 i ) = Lmix j (X γ 1 i ). Hence the consistency holds. j k=1 i 4. High Probability of obtaining Good and Good Online Views Proposition 1 (Obtaining a Good Online View has high probability). Pr[τ(A $ol ) / V good,ol ] s n. Proof. According to the definition, an online view is not a good view if i, j, i, j with C i [j] = C i [j ], where M i [..j] M i [..j ]. Suppose i < i or i = i, j < j. Then C i [j] is computed by M i [..j] before the computation of C i [j ]. As M i [..j] M i [..j ], the outcome of C i [j ] is random and fresh from C i [j]. So, the probability that C i [j] takes the previously computed fixed value C i [j] is 1. As at most ( n s ) pairs are there, the probability that τ(a $ ol ) / V good is at most s. n Proposition (Obtaining a Good View has high probability). Pr[τ(A $ ) / V good ] σ n. Proof. According to the definition, a view is not a good view if (i, j) (i, j ) with C i [j] = C i [j ]. Suppose i < i or i = i, j < j. Then C i [j] is computed by M i [..j] before the computation of C i [j ]. As M i [..j] M i [..j ], the outcome of C i [j ] is random and fresh from C i [j]. So, the probability that C i [j] takes the previously computed fixed value C i [j] is 1. As at most ( σ ) pairs are there, the n probability that τ(a $ ) / V good is at most σ. n

Characterization of EME with Linear Mixing 9 4.3 High Interpolation Probabilty of EME Lmix and EME OLmix In this section, we prove that the interpolation probability is high for ELE OLmix. Proposition 3 (High interpolation probability of EME OLmix ). τ V good,ol, Pr[τ(A EMEΠ,L OLmix) = τ] (1 4s ) Pr[τ(A $ol) = τ]. n Note that Pr[τ(A $ol ) = τ] = ns where s denotes the number of non-empty prefixes of M i, 1 i q as for every different prefixes, $ ol assigns an independent and uniform ciphertext blocks. Proof. As adversary is deterministic, we restrict to those good views which can be obtained by A. Hence the probability Pr[τ(A EME ) = τ] is same as Pr[EME Π,L OLmix (M i) = C i, 1 i q]. Before computing interpolation probability we denote all intermediate variables while computing EME L,π OLmix (M i) = C i. Let for all i and j whenever defined 1. MM i [j] = L j 1 + M i [j]. Π(MM i [j]) = X i [j], 3. OLmix(X i ) = Y i 4. CC i [j] = L j 1 + C i [j] Note that CC has been defined through ciphertext and L instead of applying Π on Y blocks. Let MM = (MM 1,..., MM q ) and similarly we define X, Y and CC. So, we have mix(x) = Y with the extended definition of mix which applies mix function for each X i. We call L valid if it computes (MM, CC) for which only equality among the blocks occurs in SS i [j] = SS i [j] where S i [j] = S i [j]. One can easily show that L is valid with probability at least (1 s n ) : Lemma 4. Pr[L is valid] (1 ɛ 1 ) where ɛ 1 = s n. Proof. Consider the bad cases when L is not valid : Case 1: MM i [j] = MM i [j ] which implies L = (M i[j]+m i [j ]) j 1 + j 1 which occurs with probabilty (s 1 ). n Case : MM i [j] = CC i [j ] which implies L = (M i[j]+c i [j ]) j 1 + j 1 which occurs with probabilty s 1.s. n Case 3: CC i [j] = MM i [j ] which implies L = (C i[j]+c i [j ]) j 1 + j 1 which occurs with probabilty (s ). n Using the union bound, we have L is not valid with probability at most s. n Hence follows the result.

10 Nilanjan Datta and Mridul Nandi Now, since the two collision relations γ 1 and γ defined earlier, are consistent with the Online linear mix function, OLmix (Proved in Lemma ) we have the following corollary from Lemma 1 : Corollary 1. #{X : coll(x) = γ 1, coll(y ) = γ } ns 1 (1 s n ) Now, for a fixed valid L, the conditional interpolation probability is X #π : π(mm) = X, π(cc) = Y #π (1 s n ) ns. So by multiplying the probability for validness of L the proof of the proposition completes. Remark 1. Note that, if we define L from E K then we need to revise the proof of the Proposition 3. The revision is mainly by defining more internal bad events that some of the Π inputs is 0 (the inputs are used to generate L value). As this adds notational complexity and does not increase the order of advantage (except the constant factor will increase) we skip it for clarity throughout the paper. Proposition 4 (High interpolation probability of EME Lmix ). τ V good, Pr[τ(A EMEΠ,L Lmix ) = τ] (1 4σ n ) Pr[τ(A $ ) = τ]. Proof. According to the definition of good view, s = σ. Assuming that, the proof is identical to the previous one. 4.4 Neccsity of Lmix (or OLmix) to obtain PRP (or OLPRP) Security of EME mix Suppose, the mix function used is not Lmix. Hence at least one entries of B matrix is zero. Let b ij be the entry. Now we have the following equation for Y [i] Y [i] = k j b ik X[k] Since Y [i] is indepentdent of X[j], hence any two messages M 1 and M (of same length) whose all blocks are same except the j th block (all other blocks are same) would yield C 1 [i] = C [i] - which breaks the full security of the construction. This shows the necessity of Lmix to obtain P RP Security of the construction. Similarly, the necessity of OLmix can be shown inorder to obtain OLP RP Security of the construction. Suppose, the mix function used is not OLmix. Hence at least one lower triangle entries of B matrix is zero. Assume b ij = 0, where j i. Now we have the following equation for Y [i] Y [i] = b ik X[k] k j j i

Characterization of EME with Linear Mixing 11 Since Y [i] is indepentdent of X[j], hence any two messages M 1 and M (of same length) whose all blocks are same except the j th block (all other blocks are same) would yield C 1 [i] = C [i] although M 1 [..i] M [..i] as they differ in the j th block. Hence it breaks the online security. 5 SPRP Attack against EME mix for any underlying field In this section, we show an SPRP attack against this construction. First, we revisit the attack that authors proposed in the paper [3] to prove that the construction with linear mix doesn t provide SPRP security. We give an adversary A that attacks the mode, distinguishing it from a Pseudo random permutation and its inverse using only 4 queries. Revisiting SPRP Attack against EME mix for binary field : 1. A queries two messages M 1 = (M 1 [1], M 1 [], M 1 [3]) and M = (M [1], M 1 [], M 1 [3]). Let C 1 = (C 1 [1], C 1 [], C 1 [3]) and C = (C [1], C [], C [3]) are the responses, respectively.. Now, A queries two ciphertexts C 3 = (C 1 [1], C [], C [3]) and C 4 = (C [1], C 1 [], C 1 [3]). Let M 3 = (M 3 [1], M 3 [], M 3 [3]) and M 4 = (M 4 [1], M 4 [], M 4 [3]) are the respective responses. 3. If M 3 [1] M 4 [1] and j 1, M 3 [j] = M 4 [j]; then A returns 1 (meaning the real). Else A returns 0 (i.e. the random). Logic behind the Attack. The main observation is that, i : Y 3 [i]+y 4 [i] = Y 1 [i]+ Y [i] and as the underlying field is binary, hence addition of two elements is zero imply that the elements are same. The authors use this two property to mount the attack. The proof is given below : j = 1,, 3 we have, X 3 [j] + X 4 [j] = (a j1 Y 3 [1] + a j Y 3 [] + a j3 Y 3 [3]) + (a j1 Y 4 [1] + a j Y 4 [] + a j3 Y 4 [3]) = a j1 (Y 3 [1] + Y 4 [1]) + a j1 (Y 3 [] + Y 4 []) + a j1 (Y 3 [3] + Y 4 [3]) = a j1 (Y [1] + Y 1 [1]) + a j1 (Y 1 [] + Y []) + a j1 (Y 1 [3] + Y [3]) = (a j1 Y 1 [1] + a j Y 1 [] + a j3 Y 1 [3]) + (a j1 Y [1] + a j Y [] + a j3 Y [3]) = X [j] + X 1 [j] Note that, in this attack, the authors uses the property of a binary field that the addition of two elements is zero implies both the values are same. Now, the question raise is what about the security of ELE mix when the underlying field is not binary. In the following two subsections, we prove that, ELE mix doesn t provide SPRP even in non-binary fields.

1 Nilanjan Datta and Mridul Nandi 5.1 SPRP Attack against EME OLmix Here we show an SPRP attack against the EME construction that uses OLmix linear mixing. 1. A queries four messages M 1 = (M 1 [1], M 1 [], M 1 [3]) and M = (M 1 [1], M [], M 1 [3]). Let C 1 = (C 1 [1], C 1 [], C 1 [3]) and C = (C 1 [1], C [], C [3]) are the responses, respectively.. Now, A queries two ciphertexts C 3 = (C 3 [1], C 1 [], C 1 [3]) and C 4 = (C 3 [1], C [], C [3]). Let M 3 = (M 3 [1], M 3 [], M 3 [3]) and M 4 = (M 4 [1], M 4 [], M 4 [3]) are the respective responses. 3. If M 3 [3] = M 4 [3]; then A returns 1 (meaning the real). Else A returns 0 (i.e. the random). Main idea why the attack works. The main idea of the attack is that the value M 3 [3] is calculated using C 1 [] and C 1 [3] both of whose values are dependent on the value M 1 []. So, the value of M 3 [3] should have an influence of the value M 3 [3] but the effects of M 1 [] via C 1 [] and C 1 [3] cancels each other out implying the value of M 1 [] has no effect in calculating M 3 [3]. Using this observation, we mount the attack. The formal proof is as follows : X 3 [3] = a 31 Y [1] + a 3 Y 1 [] + a 33 Y 1 [3] = a 31 Y [1] + a 3 (b 1 X 1 [1] + b X 1 []) +a 33 (b 31 X 1 [1] + b 3 X 1 [] + b 33 X 1 [3]) = a 31 Y [1] + (a 3 b 1 + a 33 b 31 )X 1 [1] + (a 3 b + a 33 b 3 )X 1 [] +a 33 b 33 X 1 [3] = a 31 Y [1] + (a 3 b 1 + a 33 b 31 )X 1 [1] + (a 3 b + a 33 b 3 )X [] +a 33 b 33 X 1 [3] (As a 3 b + a 33 b 3 = 0) = a 31 Y [1] + a 3 Y [] + a 33 Y 1 [3] = X 4 [3] 5. SPRP Attack against EME Lmix. The SPRP attack against the EME construction that uses Lmix as the linear mixing, is as follows : 1. A queries four messages M 1 = (M 1 [1], M 1 [], M 1 [3]), M = (M [1], M 1 [], M 1 [3]), M 3 = (M 1 [1], M 3 [], M 1 [3]) and M 4 = (M [1], M 3 [], M 1 [3]). Let C 1 = (C 1 [1], C 1 [], C 1 [3]), C = (C [1], C [], C [3]),C 3 = (C 3 [1], C 3 [], C 3 [3]) and C 4 = (C 4 [1], C 4 [], C 4 [3]) are the responses, respectively.. Now, A queries two ciphertexts C 5 = (C [1], C 1 [], C 1 [3]) and C 6 = (C 4 [1], C 3 [], C 3 [3]). Let M 5 = (M 5 [1], M 5 [], M 5 [3]) and M 6 = (M 6 [1], M 6 [], M 6 [3]) are the respective responses.

Characterization of EME with Linear Mixing 13 3. If M 5 [3] = M 6 [3]; then A returns 1 (meaning the real). Else A returns 0 (i.e. the random). Main Idea behind the attack. The main idea of the attack is similar to the previous attack. Here, we observe that the value M 5 [3] is calculated using the values C [1], C 1 [] and C 1 [3] each of which are dependent on the value M 1 []. So, the value of M 5 [3] should have an influence of the value M 1 [] but the combined effects of M 1 [] via C [1], C 1 [] and C 1 [3] cancels each other out implying the value of M 1 [] has no effect in calculating M 5 [3]. Using this observation, we mount the attack. The formal proof is as follows : X 5 [3] = a 31 Y [1] + a 3 Y 1 [] + a 33 Y 1 [3] = a 31 (b 11 X [1] + b 1 X 1 [] + b 13 X 1 [3]) + a 3 (b 1 X 1 [1] + b X 1 [] + b 3 X 1 [3]) +a 33 (b 31 X 1 [1] + b 3 X 1 [] + b 33 X 1 [3]) = a 31 b 11 X [1] + (a 3 b 1 + a 33 b 31 )X 1 [1] + (a 31 b 1 + a 3 b + a 33 b 3 )X 1 [] + (a 31 b 13 + a 3 b 3 + a 33 b 33 )X 1 [3] = a 31 b 11 X [1] + (a 3 b 1 + a 33 b 31 )X 1 [1] + (a 31 b 1 + a 3 b + a 33 b 3 )X 3 [] + (a 31 b 13 + a 3 b 3 + a 33 b 33 )X 1 [3] (As a 31 b 1 + a 3 b + a 33 b 3 = 0 ) = a 31 (b 11 X [1] + b 1 X 3 [] + b 13 X 1 [3]) + a 3 (b 1 X 1 [1] + b X 3 [] + b 3 X 1 [3]) +a 33 (b 31 X 1 [1] + b 3 X 3 [] + b 33 X 1 [3]) = a 31 Y 4 [1] + a 3 Y 3 [] + a 33 Y 3 [3] = X 6 [3] 6 Conclusion In this paper, we characterized EME with linear mixing. In particular, we showed that, the necessary as well as sufficient condition for EME with linear mixing to have the PRP and OLPRP security, is to use Lmix and OLmix respectively, as the linear mixing. We also proved that EME with linear mixing doesn t provide the SPRP security even if the construction is extended to some non-binary fields. Thus our result is a guideline that, one can have an efficient PRP or OLPRP construction using EME with efficient linear mix having Lmix or OLmix property respectively and for SPRP security based on EME construction the mixing has to be non-linear. References [1] Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar W. Tischhauser and Kan Yasuda, Parallelizable (authenticated) online ciphers (013), Asiacrypt, 013. Citations in this document: 1.. [] Nilanjan Datta and Mridul Nandi, Misuse Resistant Parallel Authenticated Encryptions (013). URL: http://eprint.iacr.org/013/767. Citations in this document: 1..

14 Nilanjan Datta and Mridul Nandi [3] Shai Halevi and Phillip Rogaway, A Tweakable Enciphering Mode 79 (003), 48 499, CRYPTO, Lecture Notes in Computer Science, 003. Citations in this document: 1, 5. [4] Michael Luby, Charles Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal of Computing (1988), 373 386. Citations in this document: 1, 1.1. [5] Jacques Patarin, The Coefficients H Technique 5381 (009), 38 345, Selected Areas in Cryptography, Lecture Notes in Computer Science, 009. Citations in this document: 1.3. [6] Serge Vaudenay, Decorrelation: A Theory for Block Cipher Security, Journal of Cryptology (003), 49 86. [7] S. Halevi and P. Rogaway., A Tweakable Enciphering Mode. 79 (003), CRYPTO, Lecture Notes in Computer Science, 003. Citations in this document: 1. [8] (no editor), CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. URL: http://competitions.cr.yp.to/caesar. html. [9] (no editor), DIAC : Directions in Authenticated Ciphers (01). URL: http:// hyperelliptic.org/diac/. [10] (no editor), DIAC : Directions in Authenticated Ciphers (013). URL: http:// 013.diac.cr.yp.to/.