Abstract
COMETv1, by Gueron, Jha and Nandi, is a mode of operation for nonce-based authenticated encryption with associated data functionality. It was one of the second round candidates in the ongoing NIST Lightweight Cryptography Standardization Process. In this paper, we study a generalized version of COMETv1, that we call gCOMET, from provable security perspective. First, we present a comprehensive and complete security proof for gCOMET in the ideal cipher model. Second, we view COMET, the underlying mode of operation in COMETv1, as an instantiation of gCOMET, and derive its concrete security bounds. Finally, we propose another instantiation of gCOMET, dubbed COMETv2, and show that this version achieves better security guarantees as well as memory-efficient implementations as compared to COMETv1.
Original language | English |
---|---|
Title of host publication | Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings |
Editors | Avishek Adhikari, Ralf Küsters, Bart Preneel |
Publisher | Springer Science and Business Media Deutschland GmbH |
Pages | 3-25 |
Number of pages | 23 |
ISBN (Print) | 9783030925178 |
DOIs | |
State | Published - 2021 |
Event | 22nd International Conference on Cryptology in India, INDOCRYPT 2021 - Jaipur, India Duration: 12 Dec 2021 → 15 Dec 2021 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 13143 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 22nd International Conference on Cryptology in India, INDOCRYPT 2021 |
---|---|
Country/Territory | India |
City | Jaipur |
Period | 12/12/21 → 15/12/21 |
Bibliographical note
Funding Information:Shay Gueron is supported by The Israel Science Foundation (grants No. 1018/16 and 3380/19); NSF-BSF Grant 2018640; The BIU Center for Research in Applied Cryptography and Cyber Security and the Center for Cyber Law and Policy at the University of Haifa, both in conjunction with the Israel National Cyber Bureau in the Prime Minister?s Office. Ashwin Jha?s work was carried out in the framework of the French-German-Center for Cybersecurity, a collaboration of CISPA and LORIA. Mridul Nandi is supported by the project ?Study and Analysis of IoT Security? under Government of India at R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata.
Funding Information:
Acknowledgments. Shay Gueron is supported by The Israel Science Foundation (grants No. 1018/16 and 3380/19); NSF-BSF Grant 2018640; The BIU Center for Research in Applied Cryptography and Cyber Security and the Center for Cyber Law and Policy at the University of Haifa, both in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. Ashwin Jha’s work was carried out in the framework of the French-German-Center for Cybersecurity, a collaboration of CISPA and LORIA. Mridul Nandi is supported by the project “Study and Analysis of IoT Security” under Government of India at R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata.
Publisher Copyright:
© 2021, Springer Nature Switzerland AG.
Keywords
- AEAD
- COMET
- ICM
- Lightweight
- Provable security
- Rekeying
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science (all)