• DocumentCode
    76768
  • Title

    Key Recycling in Authentication

  • Author

    Portmann, Christopher

  • Author_Institution
    Inst. for Theor. Phys., ETH Zurich, Zürich, Switzerland
  • Volume
    60
  • Issue
    7
  • fYear
    2014
  • fDate
    Jul-14
  • Firstpage
    4383
  • Lastpage
    4396
  • Abstract
    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter´s protocol is still ε-secure, if ε-almost strongly universal2 hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this ε. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.
  • Keywords
    cryptographic protocols; message authentication; ε-secure; Carter protocol; Wegman protocol; almost strongly universal2 hash functions; arbitrary task; composable security framework; key recycling; multiple message authentication; one-time pad; secret key; Abstracts; Authentication; Computational modeling; Cryptography; Protocols; Recycling; Cryptography; authentication; composable security; information-theoretic security;
  • fLanguage
    English
  • Journal_Title
    Information Theory, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9448
  • Type

    jour

  • DOI
    10.1109/TIT.2014.2317312
  • Filename
    6797875