Tweaking Key-Alternating Feistel Block Ciphers

被引:2
|
作者
Yan, Hailun [1 ,2 ]
Wang, Lei [2 ,4 ]
Shen, Yaobin [2 ]
Lai, Xuejia [2 ,3 ,4 ]
机构
[1] Ecole Polytechn Fed Lausanne EPFL, Lausanne, Switzerland
[2] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[3] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[4] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金; 上海市自然科学基金;
关键词
Tweakable block cipher; Key-Alternating Feistel cipher; Provable security; H-coefficient technique; TWEAKABLE BLOCKCIPHERS; SECURITY; PERMUTATION; MODES;
D O I
10.1007/978-3-030-57808-4_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tweakable block cipher as a cryptographic primitive has found wide applications in disk encryption, authenticated encryption mode and message authentication code, etc. One popular approach of designing tweakable block ciphers is to tweak the generic constructions of classic block ciphers. This paper focuses on how to build a secure tweakable block cipher from the Key-Alternating Feistel (KAF) structure, a dedicated Feistel structure with round functions of the form F-i(k(i) circle plus x(i)), where k is the secret round key and F-i is a public random function in the i-th round. We start from the simplest KAF structures that have been published so far, and then incorporate the tweaks to the round key XOR operations by (almost) universal hash functions. Moreover, we limit the number of rounds with the tweak injections for the efficiency concerns of changing the tweak value. Our results are two-fold, depending on the provable security bound: For the birthday-bound security, we present a 4-round minimal construction with two independent round keys, a single round function and two universal hash functions; For the beyond-birthday-bound security, we present a 10-round construction secure up to O(min{2(2/3), 4 root 2(2n)epsilon(-1)}) adversarial queries, where n is the output size of the round function and epsilon is the upper bound of the collision probability of the universal hash functions. Our security proofs exploit the hybrid argument combined with the H-coefficient technique.
引用
收藏
页码:69 / 88
页数:20
相关论文
共 50 条
  • [31] On the Key Schedule of Lightweight Block Ciphers
    Huang, Jialin
    Vaudenay, Serge
    Lai, Xuejia
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : 124 - 142
  • [32] Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective
    Guo, Chun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (08) : 5260 - 5280
  • [33] AKF: A key alternating Feistel scheme for lightweight cipher designs
    Karakoc, F.
    Demirci, H.
    Harmanci, A. E.
    INFORMATION PROCESSING LETTERS, 2015, 115 (02) : 359 - 367
  • [34] Multidimensional Linear Cryptanalysis of Feistel Ciphers
    Ozdemir, Betuel Askin
    Beyne, Tim
    Rijmen, Vincent
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (04) : 1 - 27
  • [35] Feistel Ciphers Based on a Single Primitive
    Tsuji, Kento
    Iwata, Tetsu
    CRYPTOGRAPHY AND CODING, IMACC 2023, 2024, 14421 : 57 - 79
  • [36] On the hypothesis of stochastic equivalence for Feistel ciphers
    Canteaut, A
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 81 - 81
  • [37] Feistel Ciphers Based on a Single Primitive∗
    Tsuji, Kento
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (08) : 1229 - 1240
  • [38] All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers
    Yang, Dong
    Qi, Wen-Feng
    Tian, Tian
    IET INFORMATION SECURITY, 2017, 11 (05) : 230 - 234
  • [39] Tweaking Even-Mansour Ciphers
    Cogliati, Benoit
    Lampe, Rodolphe
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 189 - 208
  • [40] The Key-Dependent Attack on Block Ciphers
    Sun, Xiaorui
    Lai, Xuejia
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 19 - 36