Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks

被引:0
|
作者
Bellare, Mihir [1 ]
Cash, David [1 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
来源
基金
美国国家科学基金会;
关键词
IMPOSSIBLE DIFFERENTIAL ATTACKS; RECTANGLE ATTACKS; PROOFS; CRYPTANALYSIS; ENCRYPTION; AES-192;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper fills an important foundational gap with the first proofs, under standard assumptions and in the standard model, of the existence of PRFs and PRPs resisting rich and relevant forms of related-key attack (RKA). An RKA allows the adversary to query the function not only under the target key but under other keys derived from it in adversary-specified ways. Based on the Naor-Reingold PRF we obtain an RKA-PRF whose keyspace is a group and that is proven, under DDH, to resist attacks in which the key may be operated on by arbitrary adversary-specified group elements. Our framework yields other RKA-PRFs including a DUN-based one derived from the Lewko-Waters PRF. We show how to turn these PRFs into PRPs (blockciphers) while retaining security against RKAs. Over the last 17 years cryptanalysts and blockcipher designers have routinely and consistenly targeted RKA-security; it is important for abuse-resistant cryptography; and it helps protect against fault-injection sidechannel attacks. Yet ours are the first significant proofs of existence of secure constructs. We warn that our constructs are proofs-of-concept in the foundational style and not practical.
引用
收藏
页码:666 / 684
页数:19
相关论文
共 50 条
  • [1] Ciphers secure against related-key attacks
    Lucks, S
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 359 - 370
  • [2] Cryptography Secure against Related-Key Attacks and Tampering
    Bellare, Mihir
    Cash, David
    Miller, Rachel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 486 - +
  • [3] Signcryption Secure Against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    COMPUTER JOURNAL, 2014, 57 (10): : 1472 - 1483
  • [4] Tightly Secure Encryption Schemes against Related-Key Attacks
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    Gu, Dawu
    COMPUTER JOURNAL, 2018, 61 (12): : 1825 - 1844
  • [5] Improved Constructions of PRFs Secure Against Related-Key Attacks
    Lewi, Kevin
    Montgomery, Hart
    Raghunathan, Ananth
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 44 - 61
  • [6] AES Variants Secure against Related-Key Differential and Boomerang Attacks
    Choy, Jiali
    Zhang, Aileen
    Khoo, Khoongming
    Henricksen, Matt
    Poschmann, Axel
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 191 - 207
  • [7] ON THE RELATED-KEY ATTACKS AGAINST AES
    Daemen, Joan
    Rijmen, Vincent
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (04): : 395 - 400
  • [8] Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
    Abdalla, Michel
    Benhamouda, Fabrice
    Passelegue, Alain
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 77 - 94
  • [9] An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
    Abdalla, Michel
    Benhamouda, Fabrice
    Passelegue, Alain
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 388 - 409
  • [10] Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
    Michel Abdalla
    Fabrice Benhamouda
    Alain Passelègue
    Kenneth G. Paterson
    Journal of Cryptology, 2018, 31 : 917 - 964