Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks

被引:0
|
作者
Bellare, Mihir [1 ]
Cash, David [1 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
来源
基金
美国国家科学基金会;
关键词
IMPOSSIBLE DIFFERENTIAL ATTACKS; RECTANGLE ATTACKS; PROOFS; CRYPTANALYSIS; ENCRYPTION; AES-192;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper fills an important foundational gap with the first proofs, under standard assumptions and in the standard model, of the existence of PRFs and PRPs resisting rich and relevant forms of related-key attack (RKA). An RKA allows the adversary to query the function not only under the target key but under other keys derived from it in adversary-specified ways. Based on the Naor-Reingold PRF we obtain an RKA-PRF whose keyspace is a group and that is proven, under DDH, to resist attacks in which the key may be operated on by arbitrary adversary-specified group elements. Our framework yields other RKA-PRFs including a DUN-based one derived from the Lewko-Waters PRF. We show how to turn these PRFs into PRPs (blockciphers) while retaining security against RKAs. Over the last 17 years cryptanalysts and blockcipher designers have routinely and consistenly targeted RKA-security; it is important for abuse-resistant cryptography; and it helps protect against fault-injection sidechannel attacks. Yet ours are the first significant proofs of existence of secure constructs. We warn that our constructs are proofs-of-concept in the foundational style and not practical.
引用
收藏
页码:666 / 684
页数:19
相关论文
共 50 条
  • [31] Message Authentication Codes Against Related-Key Attacks Under LPN and LWE
    CUI Nan
    LIU Shengli
    ChineseJournalofElectronics, 2021, 30 (04) : 697 - 703
  • [32] Improved related-key attacks on DESX and DESX
    Phan, Raphael C. -W.
    Shamir, Adi
    CRYPTOLOGIA, 2008, 32 (01) : 13 - 22
  • [33] Message Authentication Codes Against Related-Key Attacks Under LPN and LWE
    Nan, C. U., I
    Shengli, L. I. U.
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 697 - 703
  • [34] A Provably Secure And Efficient Countermeasure Against Timing Attacks
    Koepf, Boris
    Duermuth, Markus
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 324 - 335
  • [35] A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
    Kang, Ju-Sung
    Kim, Nayoung
    Ju, Wangho
    Yi, Ok-Yeon
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 10 - 23
  • [36] Key substitution attacks on some provably secure signature schemes
    Tan, CH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (01) : 226 - 227
  • [37] Key substitution attacks on provably secure short signature schemes
    Tan, CH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (02) : 611 - 612
  • [38] Security of Related-Key Differential Attacks on TWINE, Revisited
    Sakamoto, Kosei
    Minematsu, Kazuhiko
    Shibata, Nao
    Shigeri, Maki
    Kubo, Hiroyasu
    Funabiki, Yuki
    Isobe, Takanori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 212 - 214
  • [39] Strong Known Related-Key Attacks and the Security of ECDSA
    Yuen, Tsz Hon
    Yiu, Siu-Ming
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 130 - 145
  • [40] Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model
    Chang, Jinyong
    Dai, Honglong
    Xu, Maozhi
    Xue, Rui
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 239 - 253