Towards Understanding the Known-Key Security of Block Ciphers

被引:23
|
作者
Andreeva, Elena [1 ,2 ]
Bogdanov, Andrey [3 ]
Mennink, Bart [1 ,2 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, ESAT COSIC, Leuven, Belgium
[2] iMinds, Leuven, Belgium
[3] Tech Univ Denmark, Lyngby, Denmark
来源
关键词
Block ciphers; Known-key security; Known-key distinguishers; Indiffierentiability; RANDOM ORACLE MODEL; MERKLE-DAMGARD; IDEAL CIPHER; HASH FUNCTIONS; DISTINGUISHERS; ATTACKS; FEISTEL; INDIFFERENTIABILITY; PERMUTATIONS; CONSTRUCT;
D O I
10.1007/978-3-662-43933-3_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Known-key distinguishers for block ciphers were proposed by Knudsen and Rijmen at ASIACRYPT 2007 and have been a major research topic in cryptanalysis since then. A formalization of known-key attacks in general is known to be difficult. In this paper, we tackle this problem for the case of block ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indiffierentiability to capture the security of such block ciphers under a known key. To show its meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indiffierentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indiffierentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks.
引用
收藏
页码:348 / 366
页数:19
相关论文
共 50 条
  • [31] Truncated differential based known-key attacks on round-reduced SIMON
    Yonglin Hao
    Willi Meier
    Designs, Codes and Cryptography, 2017, 83 : 467 - 492
  • [32] Truncated differential based known-key attacks on round-reduced SIMON
    Hao, Yonglin
    Meier, Willi
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 83 (02) : 467 - 492
  • [33] Known-Key Attacks on Rijndael with Large Blocks and Strengthening Shift Row Parameter
    Sasaki, Yu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 21 - 28
  • [34] New Impossible Differential and Known-Key Distinguishers for the 3D Cipher
    Nakahara, Jorge, Jr.
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 208 - 221
  • [35] Known-Key Attacks on Type-2 GFN with SPS Round Function
    Dong, Le
    Wang, Tianli
    Du, Jiao
    Pang, Shanqi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (07) : 1488 - 1493
  • [36] KNOWN PLAINTEXT CRYPTANALYSIS OF TREE-STRUCTURED BLOCK CIPHERS
    HEYS, HM
    TAVARES, SE
    ELECTRONICS LETTERS, 1995, 31 (10) : 784 - 785
  • [37] Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY
    Zhang, Wenying
    Cao, Meichun
    Guo, Jian
    Pasalic, Enes
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 171 - 191
  • [38] Analyzing the Security-Performance Tradeoff in Block Ciphers
    Jindal, Poonam
    Singh, Brahmjit
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 326 - 331
  • [39] TYPE-PRESERVING MATRICES AND SECURITY OF BLOCK CIPHERS
    Aragona, Riccardo
    Meneghetti, Alessio
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2019, 13 (02) : 235 - 251
  • [40] Encryption performance and security of certain wide block ciphers
    Fomichev, Vladimir
    Koreneva, Alisa
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (03) : 197 - 216