Eliminating random permutation oracles in the Even-Mansour cipher

被引:0
|
作者
Gentry, C
Ramzan, Z
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Even and Mansour [EM97] proposed a block cipher construction that takes a publicly computable random permutation oracle P and XORs different keys prior to and after applying P : C = k(2) circle plus P(M circle plus k(1)). They did not, however, describe how one could instantiate such a permutation securely. It is a fundamental open problem whether their construction could be proved secure outside the random permutation oracle model. We resolve this question in the affirmative by showing that the construction can be proved secure in the random function oracle model. In particular, we show that the random permutation oracle in their scheme can be replaced by a construction that utilizes a four-round Feistel network (where each round function is a random function oracle publicly computable by all parties including the adversary). Further, we prove that the resulting cipher is super pseudorandom - the adversary's distinguishing advantage is at most 2(q)(2)/2(n) if he makes q total queries to the cipher, its inverse, as well as any random oracles. Even and Mansour, on the other hand, only showed security against inversion and forgery. One noteworthy aspect of this result is that the cipher remains secure even though the adversary is permitted separate oracle access to all of the round functions. One can achieve a two-fold and four-fold reduction respectively in the amount of key material by a closer inspection of the proof and by instantiating the scheme using group operations other than exclusive-OR. On the negative side, a straightforward adaption of an advanced slide attack recovers the 4n-bit key with approximately root2 (.) 2(n) work using roughly root2 (.) 2(n) known plaintexts. Finally, if only three Feistel rounds are used, the resulting cipher is pseudorandom, but not super pseudorandom.
引用
收藏
页码:32 / 47
页数:16
相关论文
共 50 条
  • [1] Chosen-Key Secure Even-Mansour Cipher from a Single Permutation
    Xu, Shanjie
    Da, Qi
    Guo, Chun
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 244 - 287
  • [2] Security on the Quantum-type Even-Mansour Cipher
    Kuwakado, Hidenori
    Morii, Masakatu
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 312 - 316
  • [3] Universal tweakable Even-Mansour cipher and its applications
    Zhang, Ping
    FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (04)
  • [4] Universal tweakable Even-Mansour cipher and its applications
    ZHANG Ping
    Frontiers of Computer Science, 2023, 17 (04)
  • [5] Post-Quantum Security of the Even-Mansour Cipher
    Alagic, Gorjan
    Bai, Chen
    Katz, Jonathan
    Majenz, Christian
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 458 - 487
  • [6] Minimizing the Two-Round Even-Mansour Cipher
    Chen, Shan
    Lampe, Rodolphe
    Lee, Jooyoung
    Seurin, Yannick
    Steinberger, John
    JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 1064 - 1119
  • [7] Minimizing the Two-Round Even-Mansour Cipher
    Chen, Shan
    Lampe, Rodolphe
    Lee, Jooyoung
    Seurin, Yannick
    Steinberger, John
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 39 - 56
  • [8] Generalized Tweakable Even-Mansour Cipher and Its Applications
    Zhang, Ping
    Hu, Hong-Gang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (06) : 1261 - 1277
  • [9] Generalized Tweakable Even-Mansour Cipher and Its Applications
    Ping Zhang
    Hong-Gang Hu
    Journal of Computer Science and Technology, 2018, 33 : 1261 - 1277
  • [10] Multi-user security of the tweakable Even-Mansour cipher
    Ping Zhang
    Qian Yuan
    Honggang Hu
    Peng Wang
    Science China Information Sciences, 2021, 64