Building Secure Block Ciphers on Generic Attacks Assumptions

被引:0
|
作者
Patarin, Jacques [1 ]
Seurin, Yannick [1 ]
机构
[1] Univ Versailles, Versailles, France
来源
关键词
block ciphers; Feistel schemes; generic attacks; provable security; UNBALANCED FEISTEL SCHEMES; PERMUTATIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Up to now, the design of block ciphers has been mainly driven by heuristic arguments, and little theory is known to constitute a good guideline for the development of their architecture. Trying to remedy this situation, we introduce a new type of design for symmetric cryptographic primitives with high self-similarity. Our design strategy enables to give a reductionist security proof for the primitive based on plausible assumptions regarding the complexity of the best distinguishing attacks on random Feistel schemes or other ideal constructions. Under these assumptions, the cryptographic primitives we obtain are perfectly secure against any adversary with computational resources less than a given bound. By opposition, other provably secure symmetric primitives, as for example C [3] and KFC [4], designed using information-theoretic results, are only proved to resist a limited (though significant) range of attacks. Our construction strategy leads to a large expanded key size, though still usable in practice (around 1 MB).
引用
收藏
页码:66 / 81
页数:16
相关论文
共 50 条
  • [21] Generic Attacks on Secure Outsourced Databases
    Kellaris, Georgios
    Kollios, George
    Nissim, Kobbi
    O'Neill, Adam
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1329 - 1340
  • [22] Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
    Shen, Yaobin
    Standaert, Francois-Xavier
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (02) : 47 - 68
  • [23] DISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTS
    Denisov, O., V
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (48): : 43 - 62
  • [24] Further Analysis of Block Ciphers against Timing Attacks
    LI Wei~ 1
    2. State Key Laboratory of Modern Communications
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1629 - 1632
  • [25] Attacks of simple block ciphers via efficient heuristics
    Nalini, N.
    Rao, G. Raghavendra
    INFORMATION SCIENCES, 2007, 177 (12) : 2553 - 2569
  • [26] Algebraic Attacks on Block Ciphers Using Quantum Annealing
    Burek, Elzbieta
    Wronski, Micha
    Mank, Krzysztof
    Misztal, Micha
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 678 - 689
  • [27] Systematic Construction of Nonlinear Product Attacks on Block Ciphers
    Courtois, Nicolas T.
    Abbondati, Matteo
    Ratoanina, Hamy
    Grajek, Marek
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 20 - 51
  • [28] Stream/block ciphers, difference equations and algebraic attacks
    La Scala, Roberto
    Tiwari, Sharwan K.
    JOURNAL OF SYMBOLIC COMPUTATION, 2022, 109 : 177 - 198
  • [29] Impossible differential attacks on the SKINNY family of block ciphers
    Yang, Dong
    Qi, Wen-Feng
    Chen, Hua-Jin
    IET INFORMATION SECURITY, 2017, 11 (06) : 377 - 385
  • [30] Optimally Secure Block Ciphers from Ideal Primitives
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 437 - 462