Tweaking Key-Alternating Feistel Block Ciphers

被引:2
|
作者
Yan, Hailun [1 ,2 ]
Wang, Lei [2 ,4 ]
Shen, Yaobin [2 ]
Lai, Xuejia [2 ,3 ,4 ]
机构
[1] Ecole Polytechn Fed Lausanne EPFL, Lausanne, Switzerland
[2] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[3] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[4] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金; 上海市自然科学基金;
关键词
Tweakable block cipher; Key-Alternating Feistel cipher; Provable security; H-coefficient technique; TWEAKABLE BLOCKCIPHERS; SECURITY; PERMUTATION; MODES;
D O I
10.1007/978-3-030-57808-4_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tweakable block cipher as a cryptographic primitive has found wide applications in disk encryption, authenticated encryption mode and message authentication code, etc. One popular approach of designing tweakable block ciphers is to tweak the generic constructions of classic block ciphers. This paper focuses on how to build a secure tweakable block cipher from the Key-Alternating Feistel (KAF) structure, a dedicated Feistel structure with round functions of the form F-i(k(i) circle plus x(i)), where k is the secret round key and F-i is a public random function in the i-th round. We start from the simplest KAF structures that have been published so far, and then incorporate the tweaks to the round key XOR operations by (almost) universal hash functions. Moreover, we limit the number of rounds with the tweak injections for the efficiency concerns of changing the tweak value. Our results are two-fold, depending on the provable security bound: For the birthday-bound security, we present a 4-round minimal construction with two independent round keys, a single round function and two universal hash functions; For the beyond-birthday-bound security, we present a 10-round construction secure up to O(min{2(2/3), 4 root 2(2n)epsilon(-1)}) adversarial queries, where n is the output size of the round function and epsilon is the upper bound of the collision probability of the universal hash functions. Our security proofs exploit the hybrid argument combined with the H-coefficient technique.
引用
收藏
页码:69 / 88
页数:20
相关论文
共 50 条
  • [41] Efficiency of public key cryptosystems as block ciphers
    Hassoun, Youssef
    Owayjan, Michel
    Counsell, Steve
    2016 IEEE INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON ENGINEERING TECHNOLOGY (IMCET), 2016, : 138 - 143
  • [42] Key Difference Invariant Bias in Block Ciphers
    Bogdanov, Andrey
    Boura, Christina
    Rijmen, Vincent
    Wang, Meiqin
    Wen, Long
    Zhao, Jingyuan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 357 - 376
  • [43] General Attacks on Compression Functions Based on Key Alternating Ciphers
    Luo, Yiyuan
    2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 980 - 984
  • [44] Truncated Differential Attacks on Contracting Feistel Ciphers
    Beyne, Tim
    Liu, Yunwen
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 141 - 160
  • [45] On Lai–Massey and quasi-Feistel ciphers
    Aaram Yun
    Je Hong Park
    Jooyoung Lee
    Designs, Codes and Cryptography, 2011, 58 : 45 - 72
  • [46] The security of Feistel ciphers with six rounds or less
    Knudsen, LR
    JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 207 - 222
  • [47] The Security of Feistel Ciphers with Six Rounds or Less
    Journal of Cryptology, 2002, 15 : 207 - 222
  • [48] Full round impossible differentials for Feistel ciphers
    Zakharov, D.
    Pudovkina, M.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (02) : 295 - 300
  • [49] Full round impossible differentials for Feistel ciphers
    D. Zakharov
    M. Pudovkina
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 295 - 300
  • [50] Feistel ciphers in East Germany in the communist era
    Courtois, Nicolas
    Drobick, Joerg
    Schmeh, Klaus
    CRYPTOLOGIA, 2018, 42 (05) : 427 - 444