The Related-Key Analysis of Feistel Constructions

被引:9
作者
Barbosa, Manuel [1 ,2 ]
Farshim, Pooya [3 ]
机构
[1] INESC TEC, HASLab, Braga, Portugal
[2] Univ Minho, Braga, Portugal
[3] Tech Univ Darmstadt, Fachbereich Informat, Darmstadt, Germany
来源
FAST SOFTWARE ENCRYPTION, FSE 2014 | 2015年 / 8540卷
关键词
Feistel construction; Luby-rackoff; Related-key attack; Pseudorandom permutation; Random oracle; PSEUDORANDOM PERMUTATIONS; SECURITY; ATTACKS; CIPHERS;
D O I
10.1007/978-3-662-46706-0_14
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
It is well known that the classical three-and four-round Feistel constructions are provably secure under chosen-plaintext and chosen-ciphertext attacks, respectively. However, irrespective of the number of rounds, no Feistel construction can resist related-key attacks where the keys can be offset by a constant. In this paper we show that, under suitable reuse of round keys, security under related-key attacks can be provably attained. Our modification is simpler and more efficient than alternatives obtained using generic transforms, namely the PRG transform of Bellare and Cash (CRYPTO 2010) and its random-oracle analogue outlined by Lucks (FSE 2004). Additionally we formalize Luck's transform and show that it does not always work if related keys are derived in an oracle-dependent way, and then prove it sound under appropriate restrictions.
引用
收藏
页码:265 / 284
页数:20
相关论文
共 42 条
  • [1] Albrecht MR, 2011, LECT NOTES COMPUT SC, V6733, P128
  • [2] Anderson R.J., 1998, LNCS, V1361, P125
  • [3] [Anonymous], 2008, SECURITY KEY MANAGEM
  • [4] [Anonymous], 2004, IACR CRYPTOL EPRINT
  • [5] Barbosa M., 2014, CRYPTOLOGY EPRINT AR
  • [6] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
  • [7] Bellare M., 2010, 2010397 CRYPT EPRINT
  • [8] Bellare M, 2012, LECT NOTES COMPUT SC, V7658, P331, DOI 10.1007/978-3-642-34961-4_21
  • [9] Bellare M, 2011, LECT NOTES COMPUT SC, V7073, P486, DOI 10.1007/978-3-642-25385-0_26
  • [10] Biham E, 2005, LECT NOTES COMPUT SC, V3494, P36