Revisiting the Security of COMET Authenticated Encryption Scheme

Shay Gueron, Ashwin Jha, Mridul Nandi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

COMETv1, by Gueron, Jha and Nandi, is a mode of operation for nonce-based authenticated encryption with associated data functionality. It was one of the second round candidates in the ongoing NIST Lightweight Cryptography Standardization Process. In this paper, we study a generalized version of COMETv1, that we call gCOMET, from provable security perspective. First, we present a comprehensive and complete security proof for gCOMET in the ideal cipher model. Second, we view COMET, the underlying mode of operation in COMETv1, as an instantiation of gCOMET, and derive its concrete security bounds. Finally, we propose another instantiation of gCOMET, dubbed COMETv2, and show that this version achieves better security guarantees as well as memory-efficient implementations as compared to COMETv1.

Original languageEnglish
Title of host publicationProgress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings
EditorsAvishek Adhikari, Ralf Küsters, Bart Preneel
PublisherSpringer Science and Business Media Deutschland GmbH
Pages3-25
Number of pages23
ISBN (Print)9783030925178
DOIs
StatePublished - 2021
Event22nd International Conference on Cryptology in India, INDOCRYPT 2021 - Jaipur, India
Duration: 12 Dec 202115 Dec 2021

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13143 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd International Conference on Cryptology in India, INDOCRYPT 2021
Country/TerritoryIndia
CityJaipur
Period12/12/2115/12/21

Bibliographical note

Funding Information:
Shay Gueron is supported by The Israel Science Foundation (grants No. 1018/16 and 3380/19); NSF-BSF Grant 2018640; The BIU Center for Research in Applied Cryptography and Cyber Security and the Center for Cyber Law and Policy at the University of Haifa, both in conjunction with the Israel National Cyber Bureau in the Prime Minister?s Office. Ashwin Jha?s work was carried out in the framework of the French-German-Center for Cybersecurity, a collaboration of CISPA and LORIA. Mridul Nandi is supported by the project ?Study and Analysis of IoT Security? under Government of India at R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata.

Funding Information:
Acknowledgments. Shay Gueron is supported by The Israel Science Foundation (grants No. 1018/16 and 3380/19); NSF-BSF Grant 2018640; The BIU Center for Research in Applied Cryptography and Cyber Security and the Center for Cyber Law and Policy at the University of Haifa, both in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. Ashwin Jha’s work was carried out in the framework of the French-German-Center for Cybersecurity, a collaboration of CISPA and LORIA. Mridul Nandi is supported by the project “Study and Analysis of IoT Security” under Government of India at R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata.

Publisher Copyright:
© 2021, Springer Nature Switzerland AG.

Keywords

  • AEAD
  • COMET
  • ICM
  • Lightweight
  • Provable security
  • Rekeying

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science (all)

Fingerprint

Dive into the research topics of 'Revisiting the Security of COMET Authenticated Encryption Scheme'. Together they form a unique fingerprint.

Cite this