A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers

被引:7
|
作者
Guo, Chun [1 ,2 ]
Lin, Dongdai [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
关键词
Blockcipher; Ideal cipher; Indifferentiability; Key-alternating cipher; Even-mansour cipher; Correlation intractability; SECURITY; ATTACKS; AES-192;
D O I
10.1007/978-3-662-48800-3_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Iterated Even-Mansour scheme (IEM) is a generalization of the basic 1-round proposal (ASIACRYPT '91). The scheme can use one key, two keys, or completely independent keys. Most of the published security proofs for IEM against relate-key and chosen-key attacks focus on the case where all the round-keys are derived from a single master key. Whereas results beyond this barrier are relevant to the cryptographic problem whether a secure blockcipher with key-size twice the block-size can be built by mixing two relatively independent keys into IEM and iterating sufficiently many rounds, and this strategy actually has been used in designing blockciphers for a long-time. This work makes the first step towards breaking this barrier and considers IEM with Interleaved Double independent round-keys: IDEMr((k(1), k(2)), m) = k(i) circle plus (P-r( ... k(1) circle plus P-2(k(2) circle plus P-1(k(1) circle plus m)) ...)), where i = 2 when r is odd, and i = 1 when r is even. As results, this work proves that 15 rounds can achieve (full) indifferentiability from an ideal cipher with O(q(8)/2(n)) security bound. This work also proves that 7 rounds is sufficient and necessary to achieve sequential-indifferentiability (a notion introduced at TCC 2012) with O(q(6)/2(n)) security bound, so that IDEM7 is already correlation intractable and secure against any attack that exploits evasive relations between its input-output pairs.
引用
收藏
页码:389 / 410
页数:22
相关论文
共 32 条
  • [21] An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
    Lampe, Rodolphe
    Patarin, Jacques
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 278 - 295
  • [22] From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour
    Karpman, Pierre
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 177 - 188
  • [23] Chosen-Key Secure Even-Mansour Cipher from a Single Permutation
    Xu, Shanjie
    Da, Qi
    Guo, Chun
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 244 - 287
  • [24] Minimizing Key Materials: The Even-Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption
    Zhang, Ping
    Yuan, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [25] On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
    Cogliati, Benoit
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 584 - 613
  • [26] Quantum Key Recovery Attacks on 4-Round Iterated Even-Mansour with Two Keys
    Anand, Ravi
    Ghosh, Shibam
    Isobe, Takanori
    Shiba, Rentaro
    INFORMATION SECURITY, PT I, ISC 2024, 2025, 15257 : 87 - 103
  • [27] Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher
    Isobe, Takanori
    Shibutani, Kyoji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 17 - 26
  • [28] Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even–Mansour
    Chun Guo
    Dongdai Lin
    Designs, Codes and Cryptography, 2016, 81 : 109 - 129
  • [29] BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
    Bhattacharjee, Arghya
    Bhaumik, Ritam
    Dutta, Avijit
    Nandi, Mridul
    Raychaudhuri, Anik
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (01) : 13 - 49
  • [30] BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
    Arghya Bhattacharjee
    Ritam Bhaumik
    Avijit Dutta
    Mridul Nandi
    Anik Raychaudhuri
    Designs, Codes and Cryptography, 2024, 92 (1) : 13 - 49