Towards Understanding the Known-Key Security of Block Ciphers

被引:23
|
作者
Andreeva, Elena [1 ,2 ]
Bogdanov, Andrey [3 ]
Mennink, Bart [1 ,2 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, ESAT COSIC, Leuven, Belgium
[2] iMinds, Leuven, Belgium
[3] Tech Univ Denmark, Lyngby, Denmark
来源
关键词
Block ciphers; Known-key security; Known-key distinguishers; Indiffierentiability; RANDOM ORACLE MODEL; MERKLE-DAMGARD; IDEAL CIPHER; HASH FUNCTIONS; DISTINGUISHERS; ATTACKS; FEISTEL; INDIFFERENTIABILITY; PERMUTATIONS; CONSTRUCT;
D O I
10.1007/978-3-662-43933-3_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Known-key distinguishers for block ciphers were proposed by Knudsen and Rijmen at ASIACRYPT 2007 and have been a major research topic in cryptanalysis since then. A formalization of known-key attacks in general is known to be difficult. In this paper, we tackle this problem for the case of block ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indiffierentiability to capture the security of such block ciphers under a known key. To show its meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indiffierentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indiffierentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks.
引用
收藏
页码:348 / 366
页数:19
相关论文
共 50 条
  • [41] Encryption performance and security of certain wide block ciphers
    Vladimir Fomichev
    Alisa Koreneva
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 197 - 216
  • [42] Chaos based key expansion function for block ciphers
    Kazmi, Shagufta
    Ikram, Nassar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 267 - 281
  • [43] Combinatorial Properties of Block Symmetric Ciphers Key Schedule
    Kuznetsov, Olexandr
    Gorbenko, Yuriy
    Kolovanova, Ievgeniia
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 55 - 58
  • [44] A related key attack on the feistel type block ciphers
    Computer Engineering Department, Sharif University of Technology, P. O. Box 11155-8639, Azadi Avenue, 14588 Tehran, Iran
    不详
    Int. J. Netw. Secur., 2009, 3 (221-226): : 221 - 226
  • [45] Security Analysis of Key-Alternating Feistel Ciphers
    Lampe, Rodolphe
    Seurin, Yannick
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 243 - 264
  • [46] Tweaking Key-Alternating Feistel Block Ciphers
    Yan, Hailun
    Wang, Lei
    Shen, Yaobin
    Lai, Xuejia
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 69 - 88
  • [47] Tight Security Bounds for Key-Alternating Ciphers
    Chen, Shan
    Steinberger, John
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 327 - 350
  • [48] Detecting faults in four symmetric key block ciphers
    Breveglieri, L
    Koren, I
    Maistri, P
    15TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, PROCEEDINGS, 2004, : 258 - 268
  • [49] Chaos based key expansion function for block ciphers
    Shagufta Kazmi
    Nassar Ikram
    Multimedia Tools and Applications, 2013, 66 : 267 - 281
  • [50] Towards an ultra lightweight block ciphers for Internet of Things
    Sliman, Layth
    Omrani, Tasnime
    Tari, Zahir
    Samhat, Abed Ellatif
    Rhouma, Rhouma
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61