Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks

被引:6
作者
Nakamichi, Ryota [1 ]
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Nagoya, Aichi, Japan
关键词
Beyond-birthday-bound security; Tweakable block cipher; Coefficient-H technique; Provable security; PSEUDORANDOM PERMUTATIONS; SECURITY; ENCRYPTION; MODE; MESSAGES; SCHEMES;
D O I
10.13154/tosc.v2019.i4.54-80
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and tau n-bit tweaks for tau >= 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration of the TBC for 3d rounds yields a block cipher with do-bit blocks that is secure up to 2(dn/2) queries, where d = tau + 1. In this paper, we show three results. 1. Iteration of 3d - 2 rounds is enough for the security up to 2(dn/2) queries, i.e., the security remains the same even if we reduce the number of rounds by two. 2. When the number of queries is limited to 2(n), d + 1 rounds are enough, and with d + l rounds for 1 <= l <= d - 1, the security bound improves as l grows. 3. A d-round construction gives a block cipher secure up to 2(n/2) queries, i.e., it achieves the classical birthday-bound security. Our results show that a block cipher with beyond-birthday-bound (BBB) security (with respect to n) is obtained as low as d + 1 rounds, and we draw the security spectrum of d + l round version in the range of 1 <= l <= d - 1 and l = 2d - 2 for BBB security, and l = 0 for birthday-bound security.
引用
收藏
页码:54 / 80
页数:27
相关论文
共 48 条
[1]  
Avanzi R, 2017, IACR T SYMMETRIC CRY, V2017, P4, DOI 10.13154/tosc.v2017.i1.4-44
[2]   ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption [J].
Bao, Zhenzhen ;
Guo, Jian ;
Iwata, Tetsu ;
Minematsu, Kazuhiko .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (02) :1-54
[3]   CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks [J].
Beierle, Christof ;
Leander, Gregor ;
Moradi, Amir ;
Rasoolzadeh, Shahram .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (01) :5-45
[4]   The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS [J].
Beierle, Christof ;
Jean, Jeremy ;
Koelbl, Stefan ;
Leander, Gregor ;
Moradi, Amir ;
Peyrin, Thomas ;
Sasaki, Yu ;
Sasdrich, Pascal ;
Sim, Siang Meng .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 :123-153
[5]  
Bhaumik Ritam, 2018, Advances in Cryptology - ASIACRYPT 2018. 24th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings: Lecture Notes in Computer Science (LNCS 11272), P336, DOI 10.1007/978-3-030-03326-2_12
[6]   An Inverse-Free Single-Keyed Tweakable Enciphering Scheme [J].
Bhaumik, Ritam ;
Nandi, Mridul .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 :159-180
[7]  
Chakraborty D, 2006, LECT NOTES COMPUT SC, V4329, P287
[8]  
Chakraborty D, 2006, LECT NOTES COMPUT SC, V4047, P293
[9]  
Chen S, 2014, LECT NOTES COMPUT SC, V8441, P327, DOI 10.1007/978-3-642-55220-5_19
[10]  
Chen YL, 2017, IACR T SYMMETRIC CRY, V2017, P253, DOI 10.13154/tosc.v2017.i3.253-270