Tweaking Key-Alternating Feistel Block Ciphers

被引:2
|
作者
Yan, Hailun [1 ,2 ]
Wang, Lei [2 ,4 ]
Shen, Yaobin [2 ]
Lai, Xuejia [2 ,3 ,4 ]
机构
[1] Ecole Polytechn Fed Lausanne EPFL, Lausanne, Switzerland
[2] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[3] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[4] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金; 上海市自然科学基金;
关键词
Tweakable block cipher; Key-Alternating Feistel cipher; Provable security; H-coefficient technique; TWEAKABLE BLOCKCIPHERS; SECURITY; PERMUTATION; MODES;
D O I
10.1007/978-3-030-57808-4_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tweakable block cipher as a cryptographic primitive has found wide applications in disk encryption, authenticated encryption mode and message authentication code, etc. One popular approach of designing tweakable block ciphers is to tweak the generic constructions of classic block ciphers. This paper focuses on how to build a secure tweakable block cipher from the Key-Alternating Feistel (KAF) structure, a dedicated Feistel structure with round functions of the form F-i(k(i) circle plus x(i)), where k is the secret round key and F-i is a public random function in the i-th round. We start from the simplest KAF structures that have been published so far, and then incorporate the tweaks to the round key XOR operations by (almost) universal hash functions. Moreover, we limit the number of rounds with the tweak injections for the efficiency concerns of changing the tweak value. Our results are two-fold, depending on the provable security bound: For the birthday-bound security, we present a 4-round minimal construction with two independent round keys, a single round function and two universal hash functions; For the beyond-birthday-bound security, we present a 10-round construction secure up to O(min{2(2/3), 4 root 2(2n)epsilon(-1)}) adversarial queries, where n is the output size of the round function and epsilon is the upper bound of the collision probability of the universal hash functions. Our security proofs exploit the hybrid argument combined with the H-coefficient technique.
引用
收藏
页码:69 / 88
页数:20
相关论文
共 50 条
  • [21] Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
    Viet Tung Hoang
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 3 - 32
  • [22] Quantum attacks on some feistel block ciphers
    Dong, Xiaoyang
    Dong, Bingyou
    Wang, Xiaoyun
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (06) : 1179 - 1203
  • [23] Quantum attacks on some feistel block ciphers
    Xiaoyang Dong
    Bingyou Dong
    Xiaoyun Wang
    Designs, Codes and Cryptography, 2020, 88 : 1179 - 1203
  • [24] Generalized Feistel Structures Based on Tweakable Block Ciphers
    Nakaya, Kazuki
    Iwata, Tetsu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (04) : 24 - 91
  • [25] Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK
    Zhang, Yingjie
    Lyu, Lijun
    Qiao, Kexin
    Zhang, Zhiyu
    Sun, Siwei
    Hu, Lei
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 147 - 167
  • [26] Key alternating ciphers based on involutions
    Jooyoung Lee
    Designs, Codes and Cryptography, 2018, 86 : 955 - 988
  • [27] Key alternating ciphers based on involutions
    Lee, Jooyoung
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (05) : 955 - 988
  • [28] Complementing Feistel Ciphers
    Biryukov, Alex
    Nikolic, Ivica
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 3 - 18
  • [29] Information leakage of Feistel ciphers
    Heys, HM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (01) : 23 - 35
  • [30] RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers
    Khalid, Ayesha
    Hassan, Muhammad
    Paul, Goutam
    Chattopadhyay, Anupam
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (04) : 299 - 323