On the round security of symmetric-key cryptographic primitives

被引:0
|
作者
Ramzan, Z [1 ]
Reyzin, L [1 ]
机构
[1] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of iterating simpler constructs for a number of rounds, and may provide insight into the security of such designs. We completely characterize the security of four-round Luby-Rackoff ciphers in our model, and show that the ciphers remain secure even if the adversary is given black-box access to the middle two round functions. A similar result can be obtained for message authentication codes based on universal hash functions.
引用
下载
收藏
页码:376 / 393
页数:18
相关论文
共 50 条
  • [1] Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
    Aly, Abdelrahaman
    Ashur, Tomer
    Ben-Sasson, Eli
    Dhooghe, Siemen
    Szepieniec, Alan
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 1 - 45
  • [2] USING SIMON'S ALGORITHM TO ATTACK SYMMETRIC-KEY CRYPTOGRAPHIC PRIMITIVES
    Santoli, Thomas
    Schaffner, Christian
    QUANTUM INFORMATION & COMPUTATION, 2017, 17 (1-2) : 65 - 78
  • [3] How to Use Metaheuristics for Design of Symmetric-Key Primitives
    Nikolic, Ivica
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 369 - 391
  • [4] A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
    Shrimpton, Thomas
    Stam, Martijn
    Warinschi, Bogdan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 277 - 307
  • [5] A general model of DPA attacks to precharged busses in symmetric-key cryptographic algorithms
    Alioto, M.
    Poli, M.
    Rocchi, S.
    Vignoli, V.
    2007 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN, VOLS 1-3, 2007, : 368 - 371
  • [6] Specifying the needham-schroeder symmetric-key cryptographic protocol in the ambient calculus
    Qi, Minglong
    Guo, Qiping
    Zhong, Luo
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 507 - 512
  • [7] On the Bit Security of Cryptographic Primitives
    Micciancio, Daniele
    Walter, Michael
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 3 - 28
  • [8] Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA
    Jiao, Lin
    Li, Yongqiang
    Hao, Yonglin
    Gong, Xinxin
    IET INFORMATION SECURITY, 2024, 2024
  • [9] Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
    Chase, Melissa
    Derler, David
    Goldfeder, Steven
    Orlandi, Claudio
    Ramacher, Sebastian
    Rechberger, Christian
    Slamanig, Daniel
    Zaverucha, Greg
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1825 - 1842
  • [10] Optimize cryptographic symmetric primitives performance
    Institute of Software, School of Electronic Engineering and Computer Science, Peking University, Beijing 100871, China
    不详
    Beijing Daxue Xuebao Ziran Kexue Ban, 2008, 5 (733-738):