The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation

被引:1
作者
Naito, Yusuke [1 ]
Sasaki, Yu [2 ]
Sugawara, Takeshi [3 ]
机构
[1] Mitsubishi Electr Corp, Yokohama, Kanagawa, Japan
[2] NTT Social Informat Labs, Tokyo, Japan
[3] Univ Electrocommun, Tokyo, Japan
来源
ADVANCES IN CRYPTOLOGY, PT I, EUROCRYPT 2024 | 2024年 / 14651卷
关键词
(Tweakable) Key Alternating Cipher; Single Permutation; Any Round; Multi-user Security; Tight Bound; Re-sampling Method;
D O I
10.1007/978-3-031-58716-0_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We prove the tight multi-user (mu) security of the (tweakable) key alternating cipher (KAC) for any round r with a single permutation and r-wise independent subkeys, providing a more realistic provable-security foundation for block ciphers. After Chen and Steinberger proved the single-user (su) tight security bound of r-round KAC in 2014, its extension under more realistic conditions has become a new research challenge. The state-of-the-art includes (i) single permutation by Yu et al., (ii) the mu security by Hoang and Tessaro, and (iii) correlated subkeys by Tessaro and Zhang. However, the previous works considered these conditions independently, and the tight security bound of r-round KACs with all of these conditions is an open research problem. We address it by giving the new mu-bound with an n-bit message space, approximately q. (p+rq/2(n))(r) wherein p and q are the number of primitive and construction queries, respectively. The bound ensures the security up to the O(2rn/r+1) r+1) query complexity and is tight, matching the conventional attack bound. Moreover, our result easily extends to the r-round tweakable KAC when its subkeys generated by a tweak function is r-wise independent. The proof is based on the re-sampling method originally proposed for the mu-security analysis of the triple encryption. Its extension to any rounds is the core technique enabling the new bound.
引用
收藏
页码:97 / 127
页数:31
相关论文
共 28 条
  • [1] The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
    Bellare, Mihir
    Tackmann, Bjorn
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 247 - 276
  • [2] How to decrypt or even substitute DES-encrypted messages in 228 steps
    Biham, E
    [J]. INFORMATION PROCESSING LETTERS, 2002, 84 (03) : 117 - 124
  • [3] Bogdanov A, 2012, LECT NOTES COMPUT SC, V7237, P45, DOI 10.1007/978-3-642-29011-4_5
  • [4] Chen S, 2014, LECT NOTES COMPUT SC, V8616, P39, DOI 10.1007/978-3-662-44371-2_3
  • [5] Chen S, 2014, LECT NOTES COMPUT SC, V8441, P327, DOI 10.1007/978-3-642-55220-5_19
  • [6] Chun Guo, 2018, Advances in Cryptology - ASIACRYPT 2018. 24th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings: Lecture Notes in Computer Science (LNCS 11272), P213, DOI 10.1007/978-3-030-03326-2_8
  • [7] Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks
    Cogliati, Benoit
    Dodis, Yevgeniy
    Katz, Jonathan
    Lee, Jooyoung
    Steinberger, John
    Thiruvengadam, Aishwarya
    Zhang, Zhe
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 722 - 753
  • [8] Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
    Cogliati, Benoit
    Seurin, Yannick
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 134 - 158
  • [9] Tweaking Even-Mansour Ciphers
    Cogliati, Benoit
    Lampe, Rodolphe
    Seurin, Yannick
    [J]. ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 189 - 208
  • [10] The Security of ChaCha20-Poly1305 in the Multi-User Setting
    Degabriele, Jean Paul
    Govinden, Jerome
    Guenther, Felix
    Paterson, Kenneth G.
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1981 - 2003