Provably secure counter mode with related-key-based internal re-keying

被引:0
|
作者
Evgeny K. Alekseev
Kirill S. Goncharenko
Grigory B. Marshalko
机构
[1] Crypto-Pro LLC,
[2] Moscow State University,undefined
[3] Technical committee for standardization (TC26),undefined
关键词
Secret-key cryptography; Block ciphers; Related-key; Kuznyechik; Internal re-keying;
D O I
暂无
中图分类号
学科分类号
摘要
Block cipher cryptanalysis in related-key adversary model is usually underestimated, since it is believed that the conditions of this model could be hardly achieved in practice. Nevertheless, the use of keys with known relation between them (e.g. for constructing a lightweight key-derivation procedure) in the cryptographic schemes and protocols could allow to increase their efficiency without significant security loss. In this case base cryptographic primitives (e.g. block ciphers) must be secure in a strong enough related-key adversary model. We propose a new internally re-keyed block cipher mode of operation called CTRR (”CounTer with Related-key Re-keying mode”). We prove its security under the assumption that the underlying cipher is secure in the related-key adversary model. As far as the authors know, this mode is the first block cipher encryption mode whose proven cryptographic properties are essentially based on the related-key security of the underlying primitives. We also study the security of the Kuznyechik block cipher against the related-key attack. We have managed to propose the attack only on the essentially reduced (up to 4 rounds and with significantly simplified key schedule) variant of the Kuznyechik cipher. The attack requires approximately 212\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{12}$$\end{document} encryptions under 212\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{12}$$\end{document} related keys and 243\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{43}$$\end{document} offline encryptions to recover the secret key. We also discuss why extending such an approach to the original cipher seems to be impossible. We use these heuristic reasoning to make an assumption that the cipher is secure in the corresponding adversary model and can be used with the proposed mode. At the same time, of course, the related-key cryptanalysis of the Kuznyechik cipher has to be continued. The results were originally presented at the CTCrypt’2018 workshop.
引用
收藏
页码:285 / 294
页数:9
相关论文
共 50 条
  • [1] Provably secure counter mode with related-key-based internal re-keying
    Alekseev, Evgeny K.
    Goncharenko, Kirill S.
    Marshalko, Grigory B.
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (04) : 285 - 294
  • [2] Secure group re-keying using key inverses
    El-Zoghdy, Said Fathy
    Asem, Yasser Mohammed
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2011, 18 (01) : 47 - 68
  • [3] A secure re-keying scheme with key recovery property
    Kurnio, H
    Safavi-Naini, R
    Wang, HX
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 40 - 55
  • [4] RE-KEYING SCHEME FOR SECURE MULTICAST BASED ON MULTI-GROUP KEY TREE
    Li, Yang
    Xu, Guoai
    Niu, Xinxin
    Yang, Yixian
    [J]. PROCEEDINGS OF THE 2010 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, AIAI2010, 2010, : 68 - 71
  • [5] Kronos: A scalable group re-keying approach for secure multicast
    Setia, S
    Koussih, S
    Jajodia, S
    Harder, E
    [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 215 - 228
  • [6] Efficient re-keying scheme for group key distribution
    Jiang, Yixin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    [J]. WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2639 - +
  • [7] Adaptive Secured Multicast Key Management with Re-Keying Process
    Rafiq, Jahir Ibna
    Abdullah-Al-Omar
    Chakraborty, Animesh
    Yusuf, Albub
    [J]. 2016 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC), 2016, : 181 - 185
  • [8] A novel conference key distribution system with re-keying protocol
    Huang, HF
    Chang, CC
    [J]. WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET -RELATED SOCIAL ISSUES - HSI 2005, 2005, 3597 : 282 - 290
  • [9] Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques
    Abdalla, M
    Bellare, M
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 546 - 559
  • [10] Re-keying analysis in group key management of wireless sensor networks
    Prity Kumari
    Karam Ratan Singh
    [J]. Cryptography and Communications, 2024, 16 : 665 - 677