Provably secure counter mode with related-key-based internal re-keying

被引:0
|
作者
Evgeny K. Alekseev
Kirill S. Goncharenko
Grigory B. Marshalko
机构
[1] Crypto-Pro LLC,
[2] Moscow State University,undefined
[3] Technical committee for standardization (TC26),undefined
关键词
Secret-key cryptography; Block ciphers; Related-key; Kuznyechik; Internal re-keying;
D O I
暂无
中图分类号
学科分类号
摘要
Block cipher cryptanalysis in related-key adversary model is usually underestimated, since it is believed that the conditions of this model could be hardly achieved in practice. Nevertheless, the use of keys with known relation between them (e.g. for constructing a lightweight key-derivation procedure) in the cryptographic schemes and protocols could allow to increase their efficiency without significant security loss. In this case base cryptographic primitives (e.g. block ciphers) must be secure in a strong enough related-key adversary model. We propose a new internally re-keyed block cipher mode of operation called CTRR (”CounTer with Related-key Re-keying mode”). We prove its security under the assumption that the underlying cipher is secure in the related-key adversary model. As far as the authors know, this mode is the first block cipher encryption mode whose proven cryptographic properties are essentially based on the related-key security of the underlying primitives. We also study the security of the Kuznyechik block cipher against the related-key attack. We have managed to propose the attack only on the essentially reduced (up to 4 rounds and with significantly simplified key schedule) variant of the Kuznyechik cipher. The attack requires approximately 212\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{12}$$\end{document} encryptions under 212\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{12}$$\end{document} related keys and 243\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{43}$$\end{document} offline encryptions to recover the secret key. We also discuss why extending such an approach to the original cipher seems to be impossible. We use these heuristic reasoning to make an assumption that the cipher is secure in the corresponding adversary model and can be used with the proposed mode. At the same time, of course, the related-key cryptanalysis of the Kuznyechik cipher has to be continued. The results were originally presented at the CTCrypt’2018 workshop.
引用
收藏
页码:285 / 294
页数:9
相关论文
共 50 条
  • [21] Exploring crypto-physical dark matter and learning with physical rounding towards secure and efficient fresh re-keying
    Duval, Sébastien
    Méaux, Pierrick
    Momin, Charles
    Standaert, François-Xavier
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2021 (01): : 373 - 401
  • [22] Provably secure public key cryptosystem based on chebyshev polynomials
    Yan, Shijie
    Zhen, Ping
    Min, Lequan
    [J]. Journal of Communications, 2015, 10 (06): : 380 - 384
  • [23] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [24] Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
    Bellare, Mihir
    Cash, David
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 666 - 684
  • [25] An Efficient Provably Secure Password-Based Authenticated Key Agreement
    Xu, Hanqiu
    Wang, Qingping
    Zhou, Jing
    Ruan, Ou
    [J]. INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 423 - 434
  • [26] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    [J]. China Communications, 2007, 4 (04) : 11 - 22
  • [27] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    [J]. CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [28] Implementation of a provably secure, smartcard-based key distribution protocol
    Jerdonek, R
    Honeyman, P
    Coffman, K
    Rees, J
    Wheeler, K
    [J]. SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 229 - 235
  • [29] A Provably Secure Public-Key Cryptosystem Based on Elliptic Curves
    Peng Guohua (College of Mathematics
    [J]. 信息安全与通信保密, 2005, (07) : 112 - 115
  • [30] A Provably Secure Public Key Encryption Scheme Based on Isogeny Star
    Han, Weiwei
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) : 623 - 627