Study on message authentication schemes with beyond-birthday bound security and nonce-misuse resistance생일 초과 상한 안전성과 넌스 오용 저항성을 제공하는 메시지 인증 방식에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 3
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisor이주영-
dc.contributor.authorLee, Yeongmin-
dc.contributor.author이영민-
dc.date.accessioned2024-08-08T19:31:48Z-
dc.date.available2024-08-08T19:31:48Z-
dc.date.issued2024-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=1100118&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/322209-
dc.description학위논문(박사) - 한국과학기술원 : 정보보호대학원, 2024.2,[iv, 72 p. :]-
dc.description.abstractThis paper presents a method for proving information-theoretic security of message authentication codes (MACs). We choose MAC constructions that are not known to be tight: EWCDM proposed by Cogliati and Seurin (CRYPTO '16), DWCDM proposed by Datta~\textit{et al.} (CRYPTO '18) and 5 kinds of MACs including a two-permutation variant of nEHtM where the original nEHtM was proposed by Dutta {\it et al.} (EUROCRYPT '19) and 5 kinds of MACs were proposed by Chen {\it et al.} (ASIACRYPT '21). By utilizing this method, we prove full $n$-bit security of several MACs, EWCDM, DWCDM, the variant of nEHtM, $F^{\text{EDM}}_{B_3}$, and $F^{\text{SoP}}_{B_3}$, in a nonce-respecting setting. Moreover, the variant of nEHtM and $F^{\text{SoP}}_{B_3}$ provides security when the number of queries with repeated nonces is upper bounded by $O(2^{n/8})$, improving the previous bound of $\frac{3n}{4}$-bit. To obtain those results, we generalize the Mirror theory for a wide range of $\xi_{\max}$ to apply to two-permutation-based constructions. Our approach is modular in the sense that MAC security can be obtained from PRF security, i.e., to the best of our knowledge, this is the first paper using Mirror theory but not using extended Mirror theory to prove MAC security of nonce-based MACs. Additionally, we present a matching forgery attack on $F^{\text{EDM}}_{B_4}$ and $F^{\text{EDM}}_{B_5}$ using $O(2^{3n/4})$ MAC queries and a single verification query without using repeated nonces. As a result, we provide tightness results for all kinds of two-permutation-based MACs except $F^{\text{EDMD}}_{B_2}$.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subject메시지 인증 코드▼a생일 상한을 넘는 안전성▼a미러 이론-
dc.subjectMessage authentication code▼aBeyond birthday bound security▼aMirror theory-
dc.titleStudy on message authentication schemes with beyond-birthday bound security and nonce-misuse resistance-
dc.title.alternative생일 초과 상한 안전성과 넌스 오용 저항성을 제공하는 메시지 인증 방식에 관한 연구-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
dc.contributor.alternativeauthorLee, Jooyoung-
Appears in Collection
IS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0