Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results

被引:5
|
作者
Cogliati, Benoit [1 ]
Patarin, Jacques [1 ]
Seurin, Yannick [2 ]
机构
[1] Univ Versailles, F-78000 Versailles, France
[2] ANSSI, Paris, France
来源
关键词
Block cipher; Security amplification; Cascade; Composition; Provable security; CASCADE ENCRYPTION; INDISTINGUISHABILITY; DECORRELATION;
D O I
10.1007/978-3-319-13051-4_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security amplification results for block ciphers typically state that cascading (i.e., composing with independent keys) two (or more) block ciphers yields a new block cipher that offers better security against some class of adversaries and/or that resists stronger adversaries than each of its components. One of the most important results in this respect is the so-called "two weak make one strong" theorem, first established up to logarithmic terms by Maurer and Pietrzak (TCC 2004), and later optimally tightened by Maurer, Pietrzak, and Renner (CRYPTO 2007), which states that, in the information-theoretic setting, cascading F and G(-1), where F and G are respectively (q, epsilon F)-secure and (q, epsilon G)-secure against non-adaptive chosen-plaintext (NCPA) attacks, yields a block cipher which is (q, epsilon F + epsilon G)-secure against adaptive chosen-plaintext and ciphertext (CCA) attacks. The first contribution of this work is a surprisingly simple proof of this theorem, relying on Patarin's H-coefficient method. We then extend our new proof to obtain new results (still in the information-theoretic setting). In particular, we prove a new composition theorem (which can be seen as the generalization of the "two weak make one strong" theorem to the composition of n > 2 block ciphers) which provides both amplification of the advantage and strengthening of the distinguisher's class in some optimal way (indeed we prove that our new composition theorem is tight up to some constant).
引用
收藏
页码:129 / 146
页数:18
相关论文
共 50 条
  • [1] Security amplification by composition: The case of doubly-iterated, ideal ciphers
    Aiello, W
    Bellare, M
    Di Crescenzo, G
    Venkatesan, R
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 390 - 407
  • [2] On the techniques of enhancing the security of block ciphers
    Dawu, Gu
    Yi, Wang
    2001, Association for Computing Machinery (35):
  • [3] Provable security for block ciphers by decorrelation
    Vaudenay, S
    STACS 98 - 15TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1998, 1373 : 249 - 275
  • [4] Elastic block ciphers: method, security and instantiations
    Cook, Debra L.
    Yung, Moti
    Keromytis, Angelos D.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (03) : 211 - 231
  • [5] Variation and security enhancement of block ciphers by embedding
    Shahapure, Shravani
    Sule, Virendra
    Daruwala, R. D.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (02): : 151 - 160
  • [6] Elastic block ciphers: method, security and instantiations
    Debra L. Cook
    Moti Yung
    Angelos D. Keromytis
    International Journal of Information Security, 2009, 8 : 211 - 231
  • [7] Analyzing the Security-Performance Tradeoff in Block Ciphers
    Jindal, Poonam
    Singh, Brahmjit
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 326 - 331
  • [8] TYPE-PRESERVING MATRICES AND SECURITY OF BLOCK CIPHERS
    Aragona, Riccardo
    Meneghetti, Alessio
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2019, 13 (02) : 235 - 251
  • [9] Encryption performance and security of certain wide block ciphers
    Fomichev, Vladimir
    Koreneva, Alisa
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (03) : 197 - 216
  • [10] Encryption performance and security of certain wide block ciphers
    Vladimir Fomichev
    Alisa Koreneva
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 197 - 216