Paper 2024/1928

Generic Security of GCM-SST

Akiko Inoue, NEC (Japan)
Ashwin Jha, Ruhr University Bochum
Bart Mennink, Radboud University Nijmegen
Kazuhiko Minematsu, NEC (Japan), Yokohama National University
Abstract

Authenticated encryption schemes guarantee that parties who share a secret key can communicate confidentially and authentically. One of the most popular and widely used authenticated encryption schemes is GCM by McGrew and Viega (INDOCRYPT 2004). However, despite its simplicity and efficiency, GCM also comes with its deficiencies, most notably devastating insecurity against nonce-misuse and imperfect security for short tags. Very recently, Campagna, Maximov, and Mattsson presented GCM-SST (IETF Internet draft 2024), a variant of GCM that uses a slightly more involved universal hash function composition, and claimed that this construction achieves stronger security in case of tag truncation. GCM-SST already received various interest from industries (e.g., Amazon and Ericsson) and international organizations (e.g., IETF and 3GPP) but it has not received any generic security analysis to date. In this work, we fill this gap and perform a detailed security analysis of GCM-SST. In particular, we prove that GCM-SST achieves security in the nonce-misuse resilience model of Ashur et al.~(CRYPTO 2017), roughly guaranteeing that even if nonces are reused, evaluations of GCM-SST for new nonces are secure. Our security bound also verified the designers' (informal) claim on tag truncation. Additionally, we investigate and describe possibilities to optimize the hashing in GCM-SST further, and we describe a universal forgery attack in a complexity of around $2^{33.6}$, improving over an earlier attack of $2^{40}$ complexity of Lindell, when the tag is 32 bits.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Minor revision. ACNS 2025
Keywords
Authenticated encryptionGCMGCM-SSTuniversal forgerynonce misuse
Contact author(s)
a_inoue @ nec com
letterstoashwin @ gmail com
b mennink @ cs ru nl
k-minematsu @ nec com
History
2024-11-29: approved
2024-11-27: received
See all versions
Short URL
https://ia.cr/2024/1928
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1928,
      author = {Akiko Inoue and Ashwin Jha and Bart Mennink and Kazuhiko Minematsu},
      title = {Generic Security of {GCM}-{SST}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1928},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1928}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.