A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers

被引:7
|
作者
Guo, Chun [1 ,2 ]
Lin, Dongdai [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
关键词
Blockcipher; Ideal cipher; Indifferentiability; Key-alternating cipher; Even-mansour cipher; Correlation intractability; SECURITY; ATTACKS; AES-192;
D O I
10.1007/978-3-662-48800-3_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Iterated Even-Mansour scheme (IEM) is a generalization of the basic 1-round proposal (ASIACRYPT '91). The scheme can use one key, two keys, or completely independent keys. Most of the published security proofs for IEM against relate-key and chosen-key attacks focus on the case where all the round-keys are derived from a single master key. Whereas results beyond this barrier are relevant to the cryptographic problem whether a secure blockcipher with key-size twice the block-size can be built by mixing two relatively independent keys into IEM and iterating sufficiently many rounds, and this strategy actually has been used in designing blockciphers for a long-time. This work makes the first step towards breaking this barrier and considers IEM with Interleaved Double independent round-keys: IDEMr((k(1), k(2)), m) = k(i) circle plus (P-r( ... k(1) circle plus P-2(k(2) circle plus P-1(k(1) circle plus m)) ...)), where i = 2 when r is odd, and i = 1 when r is even. As results, this work proves that 15 rounds can achieve (full) indifferentiability from an ideal cipher with O(q(8)/2(n)) security bound. This work also proves that 7 rounds is sufficient and necessary to achieve sequential-indifferentiability (a notion introduced at TCC 2012) with O(q(6)/2(n)) security bound, so that IDEM7 is already correlation intractable and secure against any attack that exploits evasive relations between its input-output pairs.
引用
收藏
页码:389 / 410
页数:22
相关论文
共 32 条
  • [31] Double-Key Recovery Based Correlation Power Analysis
    Zhou, Xinping
    Sun, Degang
    Wang, Zhu
    Ou, Changhai
    Ai, Juan
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1016 - 1022
  • [32] Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
    Dinur, Itai
    Dunkelman, Orr
    Keller, Nathan
    Shamir, Adi
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 337 - 356