Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

被引:1
|
作者
Shen, Yaobin [1 ]
Standaert, Francois-Xavier [1 ]
机构
[1] Crypto Grp, UCLouvain, ICTEAM, Louvain la Neuve, Belgium
关键词
Tweakable Block Cipher; Optimal (n-bit) Security; Large Tweak; LINEAR CRYPTANALYSIS;
D O I
10.46586/tosc.v2023.i2.47-68
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE'15 and Wang et al. at Asiacrypt'16 proposed constructions that can achieve 2n security. Yet, these constructions can have a tweak size up to n-bit only. As evident from recent research, a tweakable block cipher with a large tweak is generally helpful as a building block for modes of operation, typical applications including MACs, authenticated encryption, leakage-resistant cryptography and full-disk encryption. We begin with how to design a tweakable block cipher with 2n-bit tweak and n-bit security from two block cipher calls. For this purpose, we do an exhaustive search for tweakable block ciphers with 2n-bit tweaks from two block cipher calls, and show that all of them suffer from birthday-bound attacks. Next, we investigate the possibility to design a tweakable block cipher with 2n-bit tweak and n-bit security from three block cipher calls. We start with some conditions to build such a tweakable block cipher and propose a natural construction, called Ge1, that likely meets them. After inspection, we find a weakness in Ge1 which leads to a birthday-bound attack. Based on Ge1, we then propose another construction, called Ge2, that can avoid this weakness. We finally prove that Ge2 can achieve n-bit security with 2n-bit tweak.
引用
下载
收藏
页码:47 / 68
页数:22
相关论文
共 50 条
  • [41] The intelligent secure structure based on active block ciphers for application layer of Internet
    Luo, Lan
    Qin, ZhiGuang
    Jiang, ShaoQuan
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 52 - +
  • [42] Exhaustive Deep Learning Power Analysis for Secure Block Ciphers and Its Evaluation
    Takemoto S.
    Ikezaki Y.
    Nozaki Y.
    Yoshikawa M.
    IEEJ Transactions on Electronics, Information and Systems, 2024, 144 (01) : 7 - 14
  • [43] Short Non-Malleable Codes from Related-Key Secure Block Ciphers
    Fehr, Serge
    Karpman, Pierre
    Mennink, Bart
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (01) : 336 - 352
  • [44] Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems
    Mozaffari-Kermani, Mehran
    Tian, Kai
    Azarderakhsh, Reza
    Bayat-Sarmadi, Siavash
    IEEE EMBEDDED SYSTEMS LETTERS, 2014, 6 (04) : 89 - 92
  • [45] Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited
    Brian, Gianluca
    Faonio, Antonio
    Ribeiro, Joao
    Venturi, Daniele
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (03) : 1 - 19
  • [46] An FPGA-based performance comparison ofthe 64-bit block ciphers
    Kitsos, P
    Sklavos, N
    Galanis, MD
    Koufopavlou, O
    Intelligent Automations and Control: Trends Principles, and Applications, Vol 16, 2004, 16 : 427 - 432
  • [47] Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications
    Li, Lingchen
    Wu, Wenling
    Zhang, Lei
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 502 - 508
  • [48] Design and implementation of unified hardware for 128-bit block ciphers ARIA and AES
    Koo, Bonseok
    Ryu, Gwonho
    Chang, Taejoo
    Lee, Sangjin
    ETRI JOURNAL, 2007, 29 (06) : 820 - 822
  • [49] VLSI implementation of high performance burst mode for 128-bit block ciphers
    Mitsuyama, Y
    Andales, Z
    Onoye, T
    Shirakawa, I
    14TH ANNUAL IEEE INTERNATIONAL ASIC/SOC CONFERENCE, PROCEEDINGS, 2001, : 3 - 7
  • [50] Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
    Rivain, Matthieu
    Dottax, Emmanuelle
    Prouff, Emmanuel
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 127 - +