International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

What's wrong with Poly1305? - Improving Poly1305 through a Systematic Exploration of Design Aspects of Polynomial Hash Functions

Authors:
Jean Paul Degabriele
Jan Gilcher
Jérôme Govinden
Kenneth G. Paterson
Download:
Search ePrint
Search Google
Presentation: Slides
Abstract: One of the most popular symmetric encryption schemes in use on the Internet is ChaCha20-Poly1305. It is the default choice in tools like OpenSSH and Wireguard, and one of only three supported ciphersuites in TLS 1.3. ChaCha20Poly1305 utilizes a polynomial-based hash function for constructing Message Authentication Codes via the Wegman-Carter MAC construction. This entails evaluating the polynomial hash over the data, and blinding the output with a pseudorandom value obtained by enciphering a nonce with a blockcipher. More specifically, it uses Poly1305, originally designed with specific hardware in mind. Today, nearly 20 years later, we ask the following question: Given today's advancements and applications would we still converge to this same design?
Video: https://youtu.be/EUkBH_TcxcA
BibTeX
@misc{rwc-2024-35374,
  title={What's wrong with Poly1305? - Improving Poly1305 through a Systematic Exploration of Design Aspects of Polynomial Hash Functions},
  note={Video at \url{https://youtu.be/EUkBH_TcxcA}},
  howpublished={Talk given at RWC 2024},
  author={Jean Paul Degabriele and Jan Gilcher and Jérôme Govinden and Kenneth G. Paterson},
  year=2024
}