Connecting tweakable and multi-key blockcipher security

被引:4
作者
Lee, Jooyoung [1 ]
Luykx, Atul [2 ,3 ,4 ]
Mennink, Bart [5 ]
Minematsu, Kazuhiko [6 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, 291 Daehak Ro, Daejeon, South Korea
[2] Katholieke Univ Leuven, ESAT COSIC, Dept Elect Engn, Leuven, Belgium
[3] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[4] Imec, Ghent, Belgium
[5] Radboud Univ Nijmegen, Digital Secur Grp, Nijmegen, Netherlands
[6] NEC Corp Ltd, Nakahara Ku, 1753 Shimonumabe, Kawasaki, Kanagawa, Japan
基金
新加坡国家研究基金会;
关键词
Even-Mansour; Tweakable Even-Mansour; Cascaded LRW; Multi-key; Conjectures; MESSAGE AUTHENTICATION; CONSTRUCTION; ATTACKS; CIPHERS; PROOFS; MODES;
D O I
10.1007/s10623-017-0347-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The significance of understanding blockcipher security in the multi-key setting is highlighted by the extensive literature on attacks, and how effective key size can be significantly reduced. Nevertheless, little attention has been paid in formally understanding the design of multi-key secure blockciphers. In this work, we formalize the multi-key security of tweakable blockciphers in case of general key derivation functions. We show an equivalence between blockcipher multi-key security and tweakable blockcipher security. Our equivalence connects two objects of study, the iterated Even-Mansour (EUROCRYPT 2012) and the iterated Tweakable Even-Mansour (CRYPTO 2015), which establishes that results in both areas are, to a certain extent, transferable. Using our novel equivalence relation, we derive new bounds for both constructions, pave the path towards the solution of two well-studied conjectures, and show that, contrary to common knowledge, key derivation functions need not necessarily be pseudorandom functions in order to provide security: for the iterated Even-Mansour universal hash functions suffice.
引用
收藏
页码:623 / 640
页数:18
相关论文
共 79 条
  • [1] Albrecht MR, 2011, LECT NOTES COMPUT SC, V6733, P128
  • [2] Security of Keyed Sponge Constructions Using a Modular Proof Approach
    Andreeva, Elena
    Daemen, Joan
    Mennink, Bart
    Van Assche, Gilles
    [J]. FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 364 - 384
  • [3] Andreeva E, 2013, LECT NOTES COMPUT SC, V8042, P531, DOI 10.1007/978-3-642-40041-4_29
  • [4] Andreeva E, 2013, LECT NOTES COMPUT SC, V8269, P424, DOI 10.1007/978-3-642-42033-7_22
  • [5] [Anonymous], 2010, 1803332010 ISOIEC
  • [6] [Anonymous], 2012, LNCS, DOI DOI 10.1007/978-3-642-29011-4
  • [7] [Anonymous], 2012, LNCS, DOI DOI 10.1007/978-3-642-28496-018
  • [8] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
  • [9] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
  • [10] Bellare M., 1994, CRYPTO, P232