Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

被引:1
|
作者
Shen, Yaobin [1 ]
Standaert, Francois-Xavier [1 ]
机构
[1] Crypto Grp, UCLouvain, ICTEAM, Louvain la Neuve, Belgium
关键词
Tweakable Block Cipher; Optimal (n-bit) Security; Large Tweak; LINEAR CRYPTANALYSIS;
D O I
10.46586/tosc.v2023.i2.47-68
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE'15 and Wang et al. at Asiacrypt'16 proposed constructions that can achieve 2n security. Yet, these constructions can have a tweak size up to n-bit only. As evident from recent research, a tweakable block cipher with a large tweak is generally helpful as a building block for modes of operation, typical applications including MACs, authenticated encryption, leakage-resistant cryptography and full-disk encryption. We begin with how to design a tweakable block cipher with 2n-bit tweak and n-bit security from two block cipher calls. For this purpose, we do an exhaustive search for tweakable block ciphers with 2n-bit tweaks from two block cipher calls, and show that all of them suffer from birthday-bound attacks. Next, we investigate the possibility to design a tweakable block cipher with 2n-bit tweak and n-bit security from three block cipher calls. We start with some conditions to build such a tweakable block cipher and propose a natural construction, called Ge1, that likely meets them. After inspection, we find a weakness in Ge1 which leads to a birthday-bound attack. Based on Ge1, we then propose another construction, called Ge2, that can avoid this weakness. We finally prove that Ge2 can achieve n-bit security with 2n-bit tweak.
引用
下载
收藏
页码:47 / 68
页数:22
相关论文
共 50 条
  • [1] Tweakable Block Ciphers
    Liskov, Moses
    Rivest, Ronald L.
    Wagner, David
    JOURNAL OF CRYPTOLOGY, 2011, 24 (03) : 588 - 613
  • [2] Tweakable block ciphers
    Liskov, M
    Rivest, RL
    Wagner, D
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 31 - 46
  • [3] Tweakable Block Ciphers
    Moses Liskov
    Ronald L. Rivest
    David Wagner
    Journal of Cryptology, 2011, 24 : 588 - 613
  • [4] Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks
    Nakamichi, Ryota
    Iwata, Tetsu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 54 - 80
  • [5] Provably Quantum-Secure Tweakable Block Ciphers
    Hosoyamada, Akinori
    Iwata, Tetsu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) : 337 - 377
  • [6] Optimally Secure Block Ciphers from Ideal Primitives
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 437 - 462
  • [7] Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
    Peyrin, Thomas
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 33 - 63
  • [8] Tweakable SM4: How to tweak SM4 into tweakable block ciphers?
    Guo, Zhenzhen
    Wang, Gaoli
    Dunkelman, Orr
    Pan, Yinxue
    Liu, Shengyuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [9] Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers
    Choi, Wonseok
    Inoue, Akiko
    Lee, Byeonghak
    Lee, Jooyoung
    List, Eik
    Minematsu, Kazuhiko
    Naito, Yusuke
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (04) : 39 - 70
  • [10] On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
    Jha, Ashwin
    Nandi, Mridul
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 731 - 753