International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM

Authors:
Orr Dunkelman , Department of Computer Science, University of Haifa, Haifa, Israel
Shibam Ghosh , Department of Computer Science, University of Haifa, Haifa, Israel
Eran Lambooij , Department of Computer Science, University of Haifa, Haifa, Israel
Download:
DOI: 10.46586/tosc.v2023.i1.41-66
URL: https://tosc.iacr.org/index.php/ToSC/article/view/10303
Search ePrint
Search Google
Abstract: Encrypting too much data using the same key is a bad practice from a security perspective. Hence, it is customary to perform re-keying after a given amount of data is transmitted. While in many cases, the re-keying is done using a fresh execution of some key exchange protocol (e.g., in IKE or TLS), there are scenarios where internal re-keying, i.e., without exchange of information, is performed, mostly due to performance reasons.Originally suggested by Abdalla and Bellare, there are several proposals on how to perform this internal re-keying mechanism. For example, Liliya et al. offered the CryptoPro Key Meshing (CPKM) to be used together with GOST 28147-89 (known as the GOST block cipher). Later, ISO and the IETF adopted the Advanced CryptoPro Key Meshing (ACKPM) in ISO 10116 and RFC 8645, respectively.In this paper, we study the security of ACPKM and CPKM. We show that the internal re-keying suffers from an entropy loss in successive repetitions of the rekeying mechanism. We show some attacks based on this issue. The most prominent one has time and data complexities of O(2κ/2) and success rate of O(2−κ/4) for a κ-bit key.Furthermore, we show that a malicious block cipher designer or a faulty implementation can exploit the ACPKM (or the original CPKM) mechanism to significantly hinder the security of a protocol employing ACPKM (or CPKM). Namely, we show that in such cases, the entropy of the re-keyed key can be greatly reduced.
BibTeX
@article{tosc-2023-33053,
  title={Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM},
  journal={IACR Transactions on Symmetric Cryptology},
  publisher={Ruhr-Universität Bochum},
  volume={2023, Issue 1},
  pages={41-66},
  url={https://tosc.iacr.org/index.php/ToSC/article/view/10303},
  doi={10.46586/tosc.v2023.i1.41-66},
  author={Orr Dunkelman and Shibam Ghosh and Eran Lambooij},
  year=2023
}