Questions tagged [siv]

SIV (Synthetic Initialization Vector) is a two-pass AEAD block cipher mode of operation described in RFC 5297. It can be used either for key-wrap (nonce-less deterministic authenticated encryption) or, with a nonce, for conventional authenticated encryption with maximal tolerance of nonce reuse.

SIV (Synthetic Initialization Vector) is a two-pass AEAD block cipher mode of operation developed by Phillip Rogaway and Thomas Shrimpton and standardized in RFC 5297. It can be used either for key-wrap (nonce-less deterministic authenticated encryption) or, with a nonce, for conventional authenticated encryption with maximal tolerance of nonce reuse.

The SIV mode is based on CTR mode, CMAC and a novel construction called S2V which allows a PRF (such as CMAC) to efficiently operate on multiple input strings.

To encrypt a message, the message and any associated data are first processed using CMAC* (CMAC with S2V) to derive a "synthetic IV", which is then used to encrypt the message using CTR mode and prepended to the ciphertext. This synthetic IV effectively acts both as an IV for the encryption and as a message authentication code (MAC). When decrypting a message, the recipient first decrypts it using CTR mode with the prepended IV, and then repeats the CMAC* computation and verifies that the result agrees with the IV.

Optionally, one of the associated data inputs for SIV mode may be a nonce, such as a message number. When used without a nonce, SIV mode guarantees message authenticity and privacy, subject only to the generic disclosure of message length and the fact that, since encryption is deterministic, an attacker can tell if the same message is sent twice with the same associated data. Including a nonce eliminates this latter leak by ensuring that the associated data is unique.

See also:

32 questions
15
votes
2 answers

Why is synthetic IV (SIV) mode considered deterministic authenticated encryption (DAE)?

I was just going over my (old) notes from Coursera's Cryptography I course, and I was puzzled by the description of SIV as providing deterministic authenticated encryption (DAE). The general SIV construction shown is to first compute a MAC over the…
13
votes
1 answer

AES-SIV security

I am invesigating the AES-SIV (rfc 5297) based block cipher. The construction of the S2V is lying on the AES-CMAC and dbl and XOR operation. Given a AAD the size of L and in the 128bit block operation, I have some concern that if the L<16bytes, the…
10
votes
0 answers

Are there any weak nonce-misuse resistant encryption scheme?

Nonce-misuse resistance seems to have two standard notions: The stronger notion: this reveals nothing unless the exact same nonce is used to encrypt the exact same message twice. In this case, the only information that is revealed is that the same…
kelalaka
  • 49,797
  • 12
  • 123
  • 211
9
votes
1 answer

Why is AES-SIV not used, but AESKW, AKW1?

I'm trying to investigate different key wrapping algorithms for my implementation. I've noticed that AES-SIV is very rarely implemented by most of open source libraries. Most of them implements key wrap from RFC 3394. It's a bit weird, as AES-SIV…
7
votes
1 answer

Security of this deterministic encryption scheme

I recently came across a library that promises to do deterministic encryption with the following scheme: AES with 256 bit key in CBC mode with PKCS7 padding and Synthetic Initialization vector taken from the first 16 bytes of the HMACSHA256 mac of…
user2398029
  • 523
  • 1
  • 3
  • 14
6
votes
0 answers

Is AES-GCM-SIV with fixed IV deterministic authenticated encryption?

Is there any functional or strong security difference beyond speed between AES-GCM-SIV with implicit fixed public IV and no additional data AES-CTR (or AES-OFB) with 128-bit IV computed per HMAC-SHA-512 on the message, included at start of…
fgrieu
  • 149,326
  • 13
  • 324
  • 622
6
votes
3 answers

Why is SIV a thing if MAC-and-encrypt is not the most secure way to go?

The question that I am asking is exactly what I ask in the title.
Melab
  • 4,178
  • 4
  • 24
  • 49
5
votes
1 answer

How to Implement Deterministic Encryption Safely in .NET

I am trying to implement a deterministic encryption scheme in .NET. This link suggests I use AES-SIV mode encryption. An alternative is to use AES-CTR [ k1, nonce, message] mode with HMAC[ k2, message] as the nonce. This is effectively the same as…
user67091
  • 51
  • 2
5
votes
1 answer

What best to put in unused nonce bytes when using AES-GCM-SIV

I want to use AES-GCM-SIV for authenticated encryption of messages in my protocol. Since it is a wireless protocol I want to transmit as few bytes as possible. For successful decryption I need to transmit the nonce alongside the ciphertext and the…
Karsten
  • 151
  • 2
4
votes
1 answer

Advantages of HS1-SIV over ChaCha20-Poly1305-SIV?

What advantages does HS1-SIV have over ChaCha20-Poly1305-SIV? I know that both use the ChaCha stream cipher, but I am trying to understand why HS1-Hash is a better MAC. Edit: To hide the Poly1305 result I would use of the ChaCha20 core, a.k.a.…
Demi
  • 4,853
  • 1
  • 22
  • 40
4
votes
1 answer

What's the consequence of having a short IV? Is one mode better in that case?

I've read lots about null-length IVs being bad for most modes. In a scenario where passing a 128-bit IV along with each message isn't feasible, how would generating the IV from a smaller passed-along value impact the strength of security? Each user…
3
votes
2 answers

Are there any misuse-resistant asymmetric encryption schemes?

The notion of misuse-resistant authenticated encryption (MRAE) was defined in the symmetric setting by Rogaway and Shrimpton, along with the SIV mode that achieves it. The idea being that modern authenticated encryption cipher modes require a unique…
Neil Madden
  • 557
  • 3
  • 13
3
votes
1 answer

Which gives better deterministic encryption SIV or Plain ECB mode?

Lets say , if we encrypt a plain text message $msg$ with key $key$ in below two ways. Which is the below would give better deterministic encryption and why ? AES-ECB($key$ , $msg$) SIV($key$, NIL , $msg$) where associated data is NIL. I could not…
sashank
  • 6,234
  • 4
  • 36
  • 68
3
votes
1 answer

Signal's Key Wrap: is it safe and is it custom?

The iOS version of Signal application (not the protocol) includes a form of key wrap that I've never seen elsewhere: SHA256-HMAC-SIV. It's used to encrypt your master key with your pwHash(PIN) before sending it to signal.org's Key Backup Service. So…
Tim Shadel
  • 161
  • 5
2
votes
1 answer

Is using CFB in SIV secure?

Is SIV mode variant equally secure, if you replace CTR mode encryption with full-block CFB mode encryption? CFB seems to be safe with predictable IV: Is using a predictable IV with CFB mode safe or not? But is it safe with Encrypt-and-MAC like…
LightBit
  • 1,741
  • 14
  • 28
1
2 3