Towards Understanding the Known-Key Security of Block Ciphers

被引:23
|
作者
Andreeva, Elena [1 ,2 ]
Bogdanov, Andrey [3 ]
Mennink, Bart [1 ,2 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, ESAT COSIC, Leuven, Belgium
[2] iMinds, Leuven, Belgium
[3] Tech Univ Denmark, Lyngby, Denmark
来源
关键词
Block ciphers; Known-key security; Known-key distinguishers; Indiffierentiability; RANDOM ORACLE MODEL; MERKLE-DAMGARD; IDEAL CIPHER; HASH FUNCTIONS; DISTINGUISHERS; ATTACKS; FEISTEL; INDIFFERENTIABILITY; PERMUTATIONS; CONSTRUCT;
D O I
10.1007/978-3-662-43933-3_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Known-key distinguishers for block ciphers were proposed by Knudsen and Rijmen at ASIACRYPT 2007 and have been a major research topic in cryptanalysis since then. A formalization of known-key attacks in general is known to be difficult. In this paper, we tackle this problem for the case of block ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indiffierentiability to capture the security of such block ciphers under a known key. To show its meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indiffierentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indiffierentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks.
引用
收藏
页码:348 / 366
页数:19
相关论文
共 50 条
  • [21] Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
    Kang, HyungChul
    Hong, Deukjo
    Moon, Dukjae
    Kwon, Daesung
    Sung, Jaechul
    Hong, Seokhie
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (09) : 1550 - 1560
  • [22] On the Security Bounds for Block Ciphers Without Whitening Key Addition Against Integral Distinguishers
    Zeng, Fanyang
    Tian, Tian
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 41 - 56
  • [23] Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter
    Sasaki, Yu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 301 - 315
  • [24] Towards Distributing Block Ciphers Computations
    Forte, Andrea G.
    Ferrari, Gianluigi
    2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2015, : 41 - 46
  • [25] Elastic block ciphers: method, security and instantiations
    Cook, Debra L.
    Yung, Moti
    Keromytis, Angelos D.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (03) : 211 - 231
  • [26] Variation and security enhancement of block ciphers by embedding
    Shahapure, Shravani
    Sule, Virendra
    Daruwala, R. D.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (02): : 151 - 160
  • [27] Elastic block ciphers: method, security and instantiations
    Debra L. Cook
    Moti Yung
    Angelos D. Keromytis
    International Journal of Information Security, 2009, 8 : 211 - 231
  • [28] The Key-Dependent Attack on Block Ciphers
    Sun, Xiaorui
    Lai, Xuejia
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 19 - 36
  • [29] Efficiency of public key cryptosystems as block ciphers
    Hassoun, Youssef
    Owayjan, Michel
    Counsell, Steve
    2016 IEEE INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON ENGINEERING TECHNOLOGY (IMCET), 2016, : 138 - 143
  • [30] Key Difference Invariant Bias in Block Ciphers
    Bogdanov, Andrey
    Boura, Christina
    Rijmen, Vincent
    Wang, Meiqin
    Wen, Long
    Zhao, Jingyuan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 357 - 376