TU Darmstadt / ULB / TUbiblio

The Indifferentiability of the Duplex and Its Practical Applications

Degabriele, Jean Paul ; Fischlin, Marc ; Govinden, Jérôme (2023)
The Indifferentiability of the Duplex and Its Practical Applications.
29th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023). Guangzhou, Peoples Republic of China (04.-08.12.2023)
doi: 10.1007/978-981-99-8742-9_8
Conference or Workshop Item, Bibliographie

Abstract

The Duplex construction, introduced by Bertoni et al. (SAC 2011), is the Swiss Army knife of permutation-based cryptography. It can be used to realise a variety of cryptographic objects—ranging from hash functions and MACs, to authenticated encryption and symmetric ratchets. Testament to this is the STROBE protocol framework which is a software cryptographic library based solely on the Duplex combined with a rich set of function calls. While prior works have typically focused their attention on specific uses of the Duplex, our focus here is its indifferentiability. More specifically, we consider the indifferentiability of the Duplex construction from an online random oracle—an idealisation which shares its same interface. As one of our main results we establish the indifferentiability of the Duplex from an online random oracle. However indifferentiability only holds for the standard Duplex construction and we show that the full-state variant of the Duplex cannot meet this notion. Our indifferentiability theorem provides the theoretical justification for the security of the Duplex in a variety of scenarios, amongst others, its use as a general-purpose cryptographic primitive in the STROBE framework. Next we move our attention to AEAD schemes based on the Duplex, namely SpongeWrap, which is the basis for NIST’s Lightweight Cryptography standard Ascon. We harness the power of indifferentiability by establishing that SpongeWrap offers security against key-dependent message inputs, related-key attacks, and is also committing.

Item Type: Conference or Workshop Item
Erschienen: 2023
Creators: Degabriele, Jean Paul ; Fischlin, Marc ; Govinden, Jérôme
Type of entry: Bibliographie
Title: The Indifferentiability of the Duplex and Its Practical Applications
Language: English
Date: 19 December 2023
Publisher: Springer
Book Title: Advances in Cryptology - ASIACRYPT 2023
Series: Lecture Notes in Computer Science
Series Volume: 14445
Collation: XVIII, 329 Seiten, Illustrationen
Event Title: 29th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2023)
Event Location: Guangzhou, Peoples Republic of China
Event Dates: 04.-08.12.2023
DOI: 10.1007/978-981-99-8742-9_8
Abstract:

The Duplex construction, introduced by Bertoni et al. (SAC 2011), is the Swiss Army knife of permutation-based cryptography. It can be used to realise a variety of cryptographic objects—ranging from hash functions and MACs, to authenticated encryption and symmetric ratchets. Testament to this is the STROBE protocol framework which is a software cryptographic library based solely on the Duplex combined with a rich set of function calls. While prior works have typically focused their attention on specific uses of the Duplex, our focus here is its indifferentiability. More specifically, we consider the indifferentiability of the Duplex construction from an online random oracle—an idealisation which shares its same interface. As one of our main results we establish the indifferentiability of the Duplex from an online random oracle. However indifferentiability only holds for the standard Duplex construction and we show that the full-state variant of the Duplex cannot meet this notion. Our indifferentiability theorem provides the theoretical justification for the security of the Duplex in a variety of scenarios, amongst others, its use as a general-purpose cryptographic primitive in the STROBE framework. Next we move our attention to AEAD schemes based on the Duplex, namely SpongeWrap, which is the basis for NIST’s Lightweight Cryptography standard Ascon. We harness the power of indifferentiability by establishing that SpongeWrap offers security against key-dependent message inputs, related-key attacks, and is also committing.

Additional Information:

Part VIII

Divisions: 20 Department of Computer Science
20 Department of Computer Science > Cryptography and Complexity Theory
DFG-Collaborative Research Centres (incl. Transregio)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CRISP - Center for Research in Security and Privacy
Forschungsfelder
Forschungsfelder > Information and Intelligence
Forschungsfelder > Information and Intelligence > Cybersecurity & Privacy
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Date Deposited: 20 Dec 2023 14:37
Last Modified: 11 Apr 2024 12:22
PPN: 516206001
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details