Internet-Draft | Encrypt-then-MAC for Committing AEAD (cA | March 2023 |
Lucas | Expires 9 September 2023 | [Page] |
This document describes how to construct a committing authenticated encryption with associated data (cAEAD) algorithm by combining an unauthenticated cipher and collision-resistant, hash-based message authentication code (MAC).¶
This note is to be removed before publishing as an RFC.¶
Source for this draft and an issue tracker can be found at https://github.com/samuel-lucas6/draft-lucas-generalised-committing-aead.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 9 September 2023.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Authenticated encryption with associated data (AEAD) schemes provide confidentiality and authenticity. However, research has revealed that if keys can be adversarial, these properties are not enough. Instead, AEADs also need to be committing, meaning the ciphertext is a binding commitment of all the AEAD inputs. This requires collision resistance [BH22].¶
Unfortunately, many existing AEAD schemes, such as AES-GCM [GCM] and ChaCha20-Poly1305 [RFC8439], are not committing. This means it is possible for authentication to pass for multiple different keys. Thus, a ciphertext can be successfully decrypted to different plaintexts [ADGKLS22]. Furthermore, an attacker who knows the key can find different messages that lead to the same authentication tag.¶
This has led to practical attacks, such as the partitioning oracle attack [LGR21], which can allow an attacker to guess many encryption passwords at once by repeatedly providing a ciphertext that successfully decrypts under different keys to an oracle (e.g. a server that knows the encryption key). Such a ciphertext that potentially decrypts under thousands of keys can quickly be computed by an attacker, although the complexity and scalability of attacks depends on the AEAD. This exploits a lack of key commitment.¶
Another type of attack was demonstrated on Facebook Messenger’s message franking scheme [DGRW18], which exploited a lack of message commitment. Due to end-to-end encryption, Facebook does not know a recipient’s key. Therefore, when reporting a received message as abusive, the recipient must send their key for verification. However, a fake key could be used by the recipient to transform a harmless message from the sender into an abusive one.¶
Whilst such attacks only apply in certain scenarios, developers intuitively expect an AEAD to be committing, increasing the risk of falling prey to this type of protocol vulnerability. Moreover, certain mitigations require changes to primitives and cryptographic libraries, and many naive mitigations may leak information. For example, the padding fix and generic UtC transform [ADGKLS22] may lead to timing differences during decryption, and prepending an unsalted hash of the key leaks its identity.¶
However, Encrypt-then-MAC with the encryption key and authentication key derived from the same input keying material and a 256-bit or greater authentication tag from a collision-resistant, hash-based MAC is committing [GLR17]. This combination has been widely used, well analysed [BN00], provides additional security against forgeries, and can sometimes be more performant than certain existing AEAD schemes.¶
The partitioning oracle attack authors recommend using a committing AEAD (cAEAD) by default when non-committing AEAD vulnerabilities cannot be ruled out [LGR21]. Therefore, this document introduces a simple Encrypt-then-MAC cAEAD scheme that can be implemented using an unauthenticated cipher and collision-resistant, hash-based MAC from a cryptographic library. For instance, ChaCha20 [RFC8439] and BLAKE2b [RFC7693].¶
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
Operations:¶
a || b
: the concatenation of a
and b
.¶
a.Length
: the length of a
in octets.¶
LE64(x)
: the little-endian encoding of 64-bit unsigned integer x
.¶
UTF8(s)
: the UTF8 encoding of string s
.¶
a.Slice(i, l)
: the copy of l
octets from a
, starting at index i
.¶
Encrypt(p, n, k)
: the unauthenticated encryption of plaintext p
using nonce n
and key k
.¶
MAC(m, k, l)
: the l
-bit MAC of message m
using key k
.¶
ConstantTimeEquals(a, b)
: the constant time comparison of a
and b
, which returns true
if equal and false
otherwise.¶
Decrypt(c, n, k)
: the unauthenticated decryption of ciphertext c
without the appended tag using nonce n
and key k
.¶
ZeroMemory(a)
: overwrite a
with zeros in a way that is not optimised away by the compiler.¶
Internals:¶
T_LEN
: the authentication tag length, which MUST be 32 octets (256 bits).¶
ENCRYPTION_CONTEXT
: "Cipher.Encrypt()", replacing "Cipher" with the properly capitalised and punctuated name of the cipher being used. For example, "ChaCha20.Encrypt()" or "AES-CTR.Encrypt()".¶
MAC_CONTEXT
: "MAC.KeyedHash()", replacing "MAC" with the properly capitalised and punctuated name of the MAC being used, followed by "-" and the output length in bits if that is missing from the name. If the MAC output length is being truncated, both the full output length and truncated output length MUST be specified. For example, "BLAKE2b-256.KeyedHash()", "BLAKE2b-512-256.KeyedHash()" (truncated BLAKE2b-512), "HMAC-SHA-256.KeyedHash()", "HMAC-SHA-512-256.KeyedHash()" (truncated HMAC-SHA-512), or "HMAC-SHA-512/256.KeyedHash()" (HMAC with the SHA-512/256 algorithm).¶
Inputs and outputs:¶
K_LEN
: the key length, which MUST be 32 octets (256 bits).¶
N_MIN
/N_MAX
: the nonce length, which MUST be the maximum nonce length supported by the cipher being used. For example, 12 octets (96 bits) for ChaCha20 [RFC8439].¶
A_MAX
: 264-1 octets.¶
P_MAX
: 264-1 octets unless the cipher being used requires a smaller maximum plaintext length to avoid the internal counter repeating or a collision being likely with a 50% probability. For example, 274,877,906,880 octets MUST be the maximum for ChaCha20 [RFC8439].¶
C_MAX
: P_MAX
+ T_LEN
.¶
The meanings of these parameters are defined in [RFC5116], Section 4.¶
This scheme combines two primitives:¶
Importantly, the MAC MUST be hash-based and collision resistant. This ensures the ciphertext is a commitment of all the inputs, corresponding to security notion CMT-4 [BH22]. This provides the best security and ease of use by default.¶
Encrypt(plaintext, nonce, key, associatedData)¶
The Encrypt
function encrypts a plaintext message, authenticates the ciphertext and associated data, and returns the ciphertext concatenated with the authentication tag.¶
Inputs:¶
plaintext
: the plaintext to be encrypted (length MUST be less than P_MAX
).¶
nonce
: the public nonce (length MUST be N_MIN
).¶
key
: the secret key (length MUST be K_LEN
).¶
associatedData
: the associated data to authenticate (length MUST be less than A_MAX
).¶
Distinct associated data inputs, as described in [RFC5116], Section 3, will be unambiguously encoded as a single input. The application MUST create a structure in the associated data input if needed.¶
Outputs:¶
Steps:¶
encryptionKey = MAC(UTF8(ENCRYPTION_CONTEXT), key, K_LEN) macKey = MAC(UTF8(MAC_CONTEXT) || nonce, key, K_LEN) ciphertext = Encrypt(plaintext, nonce, encryptionKey) tag = MAC(associatedData || ciphertext || LE64(associatedData.Length) || LE64(ciphertext.Length), macKey, T_LEN) ZeroMemory(encryptionKey) ZeroMemory(macKey) return ciphertext || tag¶
Decrypt(ciphertext, nonce, key, associatedData)¶
The Decrypt
function verifies that the authentication tag is correct for the given inputs and returns the decrypted ciphertext on success or an error if verification fails.¶
Inputs:¶
ciphertext
: the ciphertext and appended tag to be authenticated and decrypted (length MUST be less than C_MAX
).¶
nonce
: the public nonce (length MUST be N_MIN
).¶
key
: the secret key (length MUST be K_LEN
).¶
associatedData
: the associated data to authenticate (length MUST be less than A_MAX
).¶
Outputs:¶
Steps:¶
tag = ciphertext.Slice(ciphertext.Length - T_LEN, T_LEN) ciphertextNoTag = ciphertext.Slice(0, ciphertext.Length - T_LEN) encryptionKey = MAC(UTF8(ENCRYPTION_CONTEXT), key, K_LEN) macKey = MAC(UTF8(MAC_CONTEXT) || nonce, key, K_LEN) computedTag = MAC(associatedData || ciphertextNoTag || LE64(associatedData.Length) || LE64(ciphertextNoTag.Length), macKey, T_LEN) ZeroMemory(macKey) if (ConstantTimeEquals(tag, computedTag) is false) ZeroMemory(encryptionKey) return "authentication failed" error else plaintext = Decrypt(ciphertextNoTag, nonce, encryptionKey) ZeroMemory(encryptionKey) return plaintext¶
This algorithm is an instantiation of the generalised cAEAD scheme discussed above using ChaCha20 [RFC8439] as the cipher and BLAKE2b [RFC7693] as the MAC.¶
The context strings are:¶
The ChaCha20 specific input and output lengths are:¶
The rest of the lengths remain the same for all instantiations of this generalised cAEAD scheme.¶
The security of this generalised scheme depends on the unauthenticated cipher and collision-resistant, hash-based MAC used. For instance, ChaCha20 should provide 256-bit security against plaintext recovery, and HMAC-SHA256 should provide at least 128-bit security against forgery attacks. A 256-bit tag provides 128-bit security against collisions. This collision resistance should make it infeasible for a ciphertext to be decrypted under multiple keys and for two messages to have the same tag.¶
The nonce MUST NOT be repeated or reused for a given key. Doing so is catastrophic for security. For example, it results in identical keystreams with stream ciphers, which leaks the XOR of the plaintexts.¶
The authentication tag comparison MUST be done in constant time to avoid leaking information via timing.¶
If authentication fails, the ciphertext MUST NOT be decrypted.¶
A larger MAC output length (e.g. 512 bits) that gets truncated to 256 bits MAY be used as long as the MAC_CONTEXT
string is specified as instructed. However, the MAC output length MUST NOT be less than or truncated below 256 bits as this would affect the collision resistance, which is needed for this scheme to be committing.¶
Every key MUST be randomly chosen from a uniform distribution. This means randomly generated using a cryptographically secure pseudorandom number generator (CSPRNG) or the output of a key derivation function (KDF).¶
The nonce MAY be public and/or predictable. It can be a counter, the output of a KDF by deriving the nonce alongside the key, or randomly generated using a CSPRNG. However, care MUST be taken to ensure that the likelihood of two randomly generated nonces colliding is low by frequently rotating the key being used.¶
The internally derived encryptionKey
and macKey
SHOULD be erased from memory before returning an output. However, this may not be possible in some programming languages.¶
IANA is requested to assign an entry for AEAD_ChaCha20_BLAKE2b
in the AEAD Registry with this document as the reference.¶
plaintext: 5468657265277320736f6d6520676f6f6420696e207468697320776f726c642c204d722e2046726f646f2c20616e64206974277320776f727468206669676874696e6720666f722e nonce: 000000000000000000000000 key: 1001000000000000000000000000000000000000000000000000000000000000 associatedData: ciphertext: 18337327ef02753bf8d996db218a3697c18943ea6efc86a7e449cb67a7592b9e1715a07771797c93789350528e2e7a8d25b4ca7a7d2968776d50577946cb5da693f1e09309236b7bdb04001a8feeab7de48946f08df1cfd0ce03a719232ea7106efb8706e40d7cb6¶
plaintext: nonce: 000000000000000000000000 key: 1001000000000000000000000000000000000000000000000000000000000000 associatedData: ciphertext: a1ad6c7c4a9bb8201cf72904ebea1fed709c75ded85adaea7034bdbba1b5ec4f¶
plaintext: nonce: 000000000000000000000000 key: 1001000000000000000000000000000000000000000000000000000000000000 associatedData: 76312e302e30 ciphertext: c0deb4501fe4cc651687cff8c9f5377072d4788cfe2d0f51dd97fab7b16fab84¶
plaintext: 5468657265277320736f6d6520676f6f6420696e207468697320776f726c642c204d722e2046726f646f2c20616e64206974277320776f727468206669676874696e6720666f722e nonce: 010000000000000000000000 key: 1001000000000000000000000000000000000000000000000000000000000000 associatedData: ciphertext: db685e0ff12fafd611a832c90e6c7905598ed65babdf6d8cf7057d07b5168673727dda3ef3d6ed2520332c8036e2ce0f72c413290bc4ae41d2d398e4cb2d1f6e906e232ae471ca0ea4ade513d685a4fab9a886fa885b6f6b54ff04d66612cfdde669bd0dbda23f54¶
plaintext: 5468657265277320736f6d6520676f6f6420696e207468697320776f726c642c204d722e2046726f646f2c20616e64206974277320776f727468206669676874696e6720666f722e nonce: 000000000000000000000000 key: 1002000000000000000000000000000000000000000000000000000000000000 associatedData: ciphertext: 308319762a72faf302e6d34c2f882c27addc1b2130549e55a084bcdc189c2da0497fdbab20989f24a25f2d3934ac825caaf46ec61a853a06eb97b14c2ced147b94c2223506862d32af0be2b1f658597412e65d77560844eee38a190063300c8e8a8c62ea25b943b3¶
This test MUST return an “authentication failed” error.¶
ciphertext: 408319762a72faf302e6d34c2f882c27addc1b2130549e55a084bcdc189c2da0497fdbab20989f24a25f2d3934ac825caaf46ec61a853a06eb97b14c2ced147b94c2223506862d32af0be2b1f658597412e65d77560844eee38a190063300c8e8a8c62ea25b943b3 nonce: 000000000000000000000000 key: 1002000000000000000000000000000000000000000000000000000000000000 associatedData:¶
This test MUST return an “authentication failed” error.¶
ciphertext: 308319762a72faf302e6d34c2f882c27addc1b2130549e55a084bcdc189c2da0497fdbab20989f24a25f2d3934ac825caaf46ec61a853a06eb97b14c2ced147b94c2223506862d32af0be2b1f658597412e65d77560844eee38a190063300c8e8a8c62ea25b943b4 nonce: 000000000000000000000000 key: 1002000000000000000000000000000000000000000000000000000000000000 associatedData:¶
This test MUST return an “authentication failed” error.¶
ciphertext: 308319762a72faf302e6d34c2f882c27addc1b2130549e55a084bcdc189c2da0497fdbab20989f24a25f2d3934ac825caaf46ec61a853a06eb97b14c2ced147b94c2223506862d32af0be2b1f658597412e65d77560844eee38a190063300c8e8a8c62ea25b943b3 nonce: 000000000000000000000001 key: 1002000000000000000000000000000000000000000000000000000000000000 associatedData:¶
This test MUST return an “authentication failed” error.¶
ciphertext: 308319762a72faf302e6d34c2f882c27addc1b2130549e55a084bcdc189c2da0497fdbab20989f24a25f2d3934ac825caaf46ec61a853a06eb97b14c2ced147b94c2223506862d32af0be2b1f658597412e65d77560844eee38a190063300c8e8a8c62ea25b943b3 nonce: 000000000000000000000000 key: 1003000000000000000000000000000000000000000000000000000000000000 associatedData:¶
This test MUST return an “authentication failed” error.¶
ciphertext: 308319762a72faf302e6d34c2f882c27addc1b2130549e55a084bcdc189c2da0497fdbab20989f24a25f2d3934ac825caaf46ec61a853a06eb97b14c2ced147b94c2223506862d32af0be2b1f658597412e65d77560844eee38a190063300c8e8a8c62ea25b943b3 nonce: 000000000000000000000000 key: 1002000000000000000000000000000000000000000000000000000000000000 associatedData: 76312e302e30¶
Thank you to Viet Tung Hoang, Julia Len, and Paul Grubbs for their excellent presentations on the topic of committing authenticated encryption.¶
ChaCha20 and Poly1305 were designed by Daniel J. Bernstein.¶
BLAKE2 was designed by Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, and Christian Winnerlein.¶
HMAC was designed by Mihir Bellare, Ran Canetti, and Hugo Krawczyk.¶