On the Indifferentiability of Key-Alternating Ciphers

被引:0
作者
Andreeva, Elena [1 ,2 ]
Bogdanov, Andrey [3 ]
Dodis, Yevgeniy [4 ]
Mennink, Bart [1 ,2 ]
Steinberger, John P. [5 ]
机构
[1] Katholieke Univ Leuven, Louvain, Belgium
[2] iMinds, Ghent, Belgium
[3] Tech Univ Denmark, Lyngby, Denmark
[4] NYU, New York, NY 10003 USA
[5] Tsinghua Univ, Beijing, Peoples R China
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I | 2013年 / 8042卷
关键词
Even-Mansour; ideal cipher; key-alternating cipher; indifferentiability; RANDOM ORACLE MODEL; IDEAL-CIPHER; MERKLE-DAMGARD; HASH FUNCTIONS; SECURITY; CONSTRUCTIONS; OPERATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structure of AES can be viewed as a (10-round) key-alternating cipher, where a t-round key-alternating cipher KA(t) consists of a small number t of fixed permutations P-i on n bits, separated by key addition: KA(t)(K, m) = kt circle plus P-t(... k(2) circle plus P-2(k(1) circle plus P-1(k(0) circle plus m)) ...), where (k(0), ..., k(t)) are obtained from the master key K using some key derivation function. For t = 1, KA(1) collapses to the well-known Even-Mansour cipher, which is known to be indistinguishable from a (secret) random permutation, if P-1 is modeled as a (public) random permutation. In this work we seek for stronger security of key-alternating ciphers - indifferentiability from an ideal cipher - and ask the question under which conditions on the key derivation function and for how many rounds t is the key-alternating cipher KA(t) indifferentiable from the ideal cipher, assuming P-1, ..., P-t are (public) random permutations? As our main result, we give an affirmative answer for t = 5, showing that the 5-round key-alternating cipher KA(5) is indifferentiable from an ideal cipher, assuming P-1, ..., P-5 are five independent random permutations, and the key derivation function sets all rounds keys k(i) = f(K), where 0 <= i <= 5 and f is modeled as a random oracle. Moreover, when vertical bar K vertical bar = vertical bar m vertical bar, we show we can set f(K) = P-0(K) circle plus K, giving an n-bit block cipher with an n-bit key, making only six calls to n-bit permutations P-0, P-1, P-2, P-3, P-4, P-5.
引用
收藏
页码:531 / 550
页数:20
相关论文
共 30 条
[21]   Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers [J].
Cao, Wenqin ;
Zhang, Wentao .
CYBERSECURITY, 2021, 4 (01)
[22]   Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers [J].
Wenqin Cao ;
Wentao Zhang .
Cybersecurity, 4
[23]   On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers [J].
Chuah, Chai Wen ;
Alawatugoda, Janaka ;
Arbaiy, Nureize .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) :1486-1493
[24]   Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers [J].
Rana, Muhammad ;
Mamun, Quazi ;
Islam, Rafiqul .
SENSORS, 2023, 23 (18)
[25]   Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers [J].
Guo, Chun ;
Katz, Jonathan ;
Wang, Xiao ;
Yu, Yu .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :825-841
[26]   Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective [J].
Guo, Chun .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (08) :5260-5280
[27]   Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited [J].
Zhang, Liting ;
Wu, Wenling ;
Wang, Peng ;
Zhang, Lei ;
Wu, Shuang ;
Liang, Bo .
FAST SOFTWARE ENCRYPTION, 2010, 6147 :250-+
[28]   Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers [J].
Gazi, Peter .
ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 :551-570
[29]   AKF: A key alternating Feistel scheme for lightweight cipher designs [J].
Karakoc, F. ;
Demirci, H. ;
Harmanci, A. E. .
INFORMATION PROCESSING LETTERS, 2015, 115 (02) :359-367
[30]   Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing [J].
Cogliati, Benoit ;
Seurin, Yannick .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 :134-158