Connecting tweakable and multi-key blockcipher security

被引:0
作者
Jooyoung Lee
Atul Luykx
Bart Mennink
Kazuhiko Minematsu
机构
[1] KAIST,School of Computing
[2] KU Leuven,Department of Electrical Engineering, ESAT/COSIC
[3] University of California,Department of Computer Science
[4] imec,Digital Security Group
[5] Radboud University,undefined
[6] NEC Corporation,undefined
来源
Designs, Codes and Cryptography | 2018年 / 86卷
关键词
Even–Mansour; Tweakable Even–Mansour; Cascaded LRW; Multi-key; Conjectures; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
The significance of understanding blockcipher security in the multi-key setting is highlighted by the extensive literature on attacks, and how effective key size can be significantly reduced. Nevertheless, little attention has been paid in formally understanding the design of multi-key secure blockciphers. In this work, we formalize the multi-key security of tweakable blockciphers in case of general key derivation functions. We show an equivalence between blockcipher multi-key security and tweakable blockcipher security. Our equivalence connects two objects of study, the iterated Even–Mansour (EUROCRYPT 2012) and the iterated Tweakable Even–Mansour (CRYPTO 2015), which establishes that results in both areas are, to a certain extent, transferable. Using our novel equivalence relation, we derive new bounds for both constructions, pave the path towards the solution of two well-studied conjectures, and show that, contrary to common knowledge, key derivation functions need not necessarily be pseudorandom functions in order to provide security: for the iterated Even–Mansour universal hash functions suffice.
引用
收藏
页码:623 / 640
页数:17
相关论文
共 11 条
  • [1] Biham E(2002)How to decrypt or even substitute DES-encrypted messages in 2 Inf. Process. Lett. 84 117-124
  • [2] den Boer B(1993) steps J. Comput. Secur. 2 65-72
  • [3] Daemen J(2012)A simple and key-economical unconditional authentication scheme Proc. Rom. Acad. Ser. A 13 395-400
  • [4] Rijmen V(1997)On the related-key attacks against aes J. Cryptol. 10 151-162
  • [5] Even S(2004)A construction of a cipher from a single pseudorandom permutation Des. Codes Cryptogr. 33 261-274
  • [6] Mansour Y(2004)Security of signature schemes in a multi-user setting SIAM J. Comput. 33 505-543
  • [7] Menezes A(1981)On universal classes of extremely random constant-time hash functions J. Comput. Syst. Sci. 22 265-279
  • [8] Smart NP(undefined)New hash functions and their use in authentication and set equality undefined undefined undefined-undefined
  • [9] Siegel A(undefined)undefined undefined undefined undefined-undefined
  • [10] Wegman MN(undefined)undefined undefined undefined undefined-undefined