A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers

被引:7
|
作者
Guo, Chun [1 ,2 ]
Lin, Dongdai [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
关键词
Blockcipher; Ideal cipher; Indifferentiability; Key-alternating cipher; Even-mansour cipher; Correlation intractability; SECURITY; ATTACKS; AES-192;
D O I
10.1007/978-3-662-48800-3_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Iterated Even-Mansour scheme (IEM) is a generalization of the basic 1-round proposal (ASIACRYPT '91). The scheme can use one key, two keys, or completely independent keys. Most of the published security proofs for IEM against relate-key and chosen-key attacks focus on the case where all the round-keys are derived from a single master key. Whereas results beyond this barrier are relevant to the cryptographic problem whether a secure blockcipher with key-size twice the block-size can be built by mixing two relatively independent keys into IEM and iterating sufficiently many rounds, and this strategy actually has been used in designing blockciphers for a long-time. This work makes the first step towards breaking this barrier and considers IEM with Interleaved Double independent round-keys: IDEMr((k(1), k(2)), m) = k(i) circle plus (P-r( ... k(1) circle plus P-2(k(2) circle plus P-1(k(1) circle plus m)) ...)), where i = 2 when r is odd, and i = 1 when r is even. As results, this work proves that 15 rounds can achieve (full) indifferentiability from an ideal cipher with O(q(8)/2(n)) security bound. This work also proves that 7 rounds is sufficient and necessary to achieve sequential-indifferentiability (a notion introduced at TCC 2012) with O(q(6)/2(n)) security bound, so that IDEM7 is already correlation intractable and secure against any attack that exploits evasive relations between its input-output pairs.
引用
收藏
页码:389 / 410
页数:22
相关论文
共 32 条
  • [1] Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules)
    Xu, Shanjie
    Da, Qi
    Guo, Chun
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 125 - 145
  • [2] Tweaking Even-Mansour Ciphers
    Cogliati, Benoit
    Lampe, Rodolphe
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 189 - 208
  • [3] The Related-Key Security of Iterated Even-Mansour Ciphers
    Farshim, Pooya
    Procter, Gordon
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 342 - 363
  • [4] Quantum key recovery attacks on tweakable Even-Mansour ciphers
    Zhang, Ping
    Luo, Yiyuan
    QUANTUM INFORMATION PROCESSING, 2023, 22 (09)
  • [5] Forking Tweakable Even-Mansour Ciphers
    Kim, Hwigyeom
    Lee, Yeongmin
    Lee, Jooyoung
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (04) : 71 - 87
  • [6] Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient
    Dai, Yuanxi
    Seurin, Yannick
    Steinberger, John
    Thiruvengadam, Aishwarya
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 524 - 555
  • [7] Key-Recovery Security of Single-Key Even-Mansour Ciphers
    Isobe, Takanori
    Shibutani, Kyoji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (07) : 893 - 905
  • [8] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Hosoyamada, Akinori
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 27 - 34
  • [9] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Hosoyamada, Akinori
    Aoki, Kazumaro
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 3 - 18
  • [10] New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
    Isobe, Takanori
    Shibutani, Kyoji
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 244 - 263