Towards Understanding the Known-Key Security of Block Ciphers

被引:23
作者
Andreeva, Elena [1 ,2 ]
Bogdanov, Andrey [3 ]
Mennink, Bart [1 ,2 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, ESAT COSIC, Leuven, Belgium
[2] iMinds, Leuven, Belgium
[3] Tech Univ Denmark, Lyngby, Denmark
来源
FAST SOFTWARE ENCRYPTION (FSE 2013) | 2014年 / 8424卷
关键词
Block ciphers; Known-key security; Known-key distinguishers; Indiffierentiability; RANDOM ORACLE MODEL; MERKLE-DAMGARD; IDEAL CIPHER; HASH FUNCTIONS; DISTINGUISHERS; ATTACKS; FEISTEL; INDIFFERENTIABILITY; PERMUTATIONS; CONSTRUCT;
D O I
10.1007/978-3-662-43933-3_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Known-key distinguishers for block ciphers were proposed by Knudsen and Rijmen at ASIACRYPT 2007 and have been a major research topic in cryptanalysis since then. A formalization of known-key attacks in general is known to be difficult. In this paper, we tackle this problem for the case of block ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indiffierentiability to capture the security of such block ciphers under a known key. To show its meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indiffierentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indiffierentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks.
引用
收藏
页码:348 / 366
页数:19
相关论文
共 54 条
  • [1] Andreeva E, 2010, LECT NOTES COMPUT SC, V6280, P88, DOI 10.1007/978-3-642-15317-4_7
  • [2] [Anonymous], 1993, LECT NOTES COMPUTER
  • [3] Bellare M, 2006, LECT NOTES COMPUT SC, V4284, P299
  • [4] Bertoni G, 2008, LECT NOTES COMPUT SC, V4965, P181
  • [5] Bhattacharyya R, 2010, LECT NOTES COMPUT SC, V6147, P168, DOI 10.1007/978-3-642-13858-4_10
  • [6] Biryukov A, 2010, LECT NOTES COMPUT SC, V6110, P299
  • [7] Biryukov A, 2009, LECT NOTES COMPUT SC, V5912, P1, DOI 10.1007/978-3-642-10366-7_1
  • [8] Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14
  • [9] Bogdanov A, 2012, LECT NOTES COMPUT SC, V7237, P45, DOI 10.1007/978-3-642-29011-4_5
  • [10] Bogdanov A, 2011, LECT NOTES COMPUT SC, V7073, P344, DOI 10.1007/978-3-642-25385-0_19