Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing

被引:26
作者
Cogliati, Benoit [1 ]
Seurin, Yannick [2 ]
机构
[1] Univ Versailles, F-78000 Versailles, France
[2] ANSSI, Paris, France
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II | 2015年 / 9453卷
关键词
Tweakable block cipher; Iterated Even-Mansour cipher; Key-alternating cipher; Beyond-birthday-bound security; CONSTRUCTION; BLOCKCIPHERS; MODES;
D O I
10.1007/978-3-662-48800-3_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The iterated Even-Mansour construction defines a block cipher from a tuple of public n-bit permutations (P-1, ..., P-r) by alternatively xoring some n-bit round key k(i), i = 0, ..., r, and applying permutation Pi to the state. The tweakable Even-Mansour construction generalizes the conventional Even-Mansour construction by replacing the n-bit round keys by n-bit strings derived from a master key and a tweak, thereby defining a tweakable block cipher. Constructions of this type have been previously analyzed, but they were either secure only up to the birthday bound, or they used a nonlinear mixing function of the key and the tweak (typically, multiplication of the key and the tweak seen as elements of some finite field) which might be costly to implement. In this paper, we tackle the question of whether it is possible to achieve beyond-birthday-bound security for such a construction by using only linear operations for mixing the key and the tweak into the state. We answer positively, describing a 4-round construction with a 2n-bit master key and an n-bit tweak which is provably secure in the Random Permutation Model up to roughly 2(2n/3) adversarial queries.
引用
收藏
页码:134 / 158
页数:25
相关论文
共 36 条
[1]  
Andreeva E, 2013, LECT NOTES COMPUT SC, V8269, P424, DOI 10.1007/978-3-642-42033-7_22
[2]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
[3]  
Bogdanov A, 2012, LECT NOTES COMPUT SC, V7237, P45, DOI 10.1007/978-3-642-29011-4_5
[4]  
Chakraborty D, 2006, LECT NOTES COMPUT SC, V4318, P88
[5]  
Chen S, 2014, LECT NOTES COMPUT SC, V8616, P39, DOI 10.1007/978-3-662-44371-2_3
[6]  
Chen S, 2014, LECT NOTES COMPUT SC, V8441, P327, DOI 10.1007/978-3-642-55220-5_19
[7]  
Cogliati B., 2015, BEYOND BIRTHDAY BOUN
[8]   On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks [J].
Cogliati, Benoit ;
Seurin, Yannick .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :584-613
[9]   Tweaking Even-Mansour Ciphers [J].
Cogliati, Benoit ;
Lampe, Rodolphe ;
Seurin, Yannick .
ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 :189-208
[10]  
Crowley Paul, 2000, LNCS, V1978, P49