A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality

OCB3 is a mature and provably secure authenticated encryption mode of operation which allows for associated data (AEAD). This note reports a small flaw in the security proof of OCB3 that may cause a loss of security in practice, even if OCB3 is correctly implemented in a trustworthy and nonce-respec...

Full description

Saved in:
Bibliographic Details
Published in:Information processing letters Vol. 183; p. 106404
Main Authors: Liénardy, Jean, Lafitte, Frédéric
Format: Journal Article
Language:English
Published: Elsevier B.V 01-01-2024
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:OCB3 is a mature and provably secure authenticated encryption mode of operation which allows for associated data (AEAD). This note reports a small flaw in the security proof of OCB3 that may cause a loss of security in practice, even if OCB3 is correctly implemented in a trustworthy and nonce-respecting module. The flaw is present when OCB3 is used with short nonces. It has security implications that are worse than nonce-repetition as confidentiality and authenticity are lost until the key is changed. The flaw is due to an implicit condition in the security proof and to the way OCB3 processes nonces. Different ways to fix the mode are presented. •OCB3 is the latest in a series of AE algorithms designed to provide proven security in the concrete security framework.•We point out an implicit assumption in the security proof that may cause some compliant implementations to lose all security.•We investigate the security implications and argue why OCB3's specification documents should be updated accordingly.
ISSN:0020-0190
1872-6119
DOI:10.1016/j.ipl.2023.106404