Generalized Tweakable Even-Mansour Cipher and Its Applications

被引:0
|
作者
Ping Zhang
Hong-Gang Hu
机构
[1] Chinese Academy of Sciences,Key Laboratory of Electromagnetic Space Information
[2] University of Science and Technology of China,School of Information Science and Technology
关键词
tweakable blockcipher; H-coefficients technique; authentication; authenticated encryption; provable security;
D O I
暂无
中图分类号
学科分类号
摘要
This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based on a public random permutation P and a family of almost-XOR-universal hash functions H=HKK∈K\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \mathcal{H}={\left\{ HK\right\}}_{K\in \mathcal{K}} $$\end{document} as a tweak and key schedule, and defined as y = HPHK((t1, t2), x) = P(x ⊕ HK(t1)) ⊕ HK(t2), where K is a key randomly chosen from a key space K\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \mathcal{K} $$\end{document}, (t1, t2) is a tweak chosen from a valid tweak space T\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \mathcal{T} $$\end{document}, x is a plaintext, and y is a ciphertext. We prove that HPH is a secure strong tweakable pseudorandom permutation (STPRP) by using H-coefficients technique. Then we focus on the security of HPH against multi-key and related-key attacks. We prove that HPH achieves both multi-key STPRP security and related-key STPRP security. HPH can be extended to wide applications. It can be directly applied to authentication and authenticated encryption modes. We apply HPH to PMAC1 and OPP, provide an improved authentication mode HPMAC and a new authenticated encryption mode OPH, and prove that the two modes achieve single-key security, multi-key security, and related-key security.
引用
收藏
页码:1261 / 1277
页数:16
相关论文
共 50 条
  • [21] Minimizing Key Materials: The Even-Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption
    Zhang, Ping
    Yuan, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [22] The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher
    Liu, Fangzhou
    Zhu, Xueqi
    Xu, Ruozhou
    Shi, Danping
    Wang, Peng
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 3 - 19
  • [23] Tweaking Even-Mansour Ciphers
    Cogliati, Benoit
    Lampe, Rodolphe
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 189 - 208
  • [24] Chosen-Key Secure Even-Mansour Cipher from a Single Permutation
    Xu, Shanjie
    Da, Qi
    Guo, Chun
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 244 - 287
  • [25] Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
    Cogliati, Benoit
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 134 - 158
  • [26] On the Resilience of Even-Mansour to Invariant Permutations
    Bart Mennink
    Samuel Neves
    Designs, Codes and Cryptography, 2021, 89 : 859 - 893
  • [27] On the Resilience of Even-Mansour to Invariant Permutations
    Mennink, Bart
    Neves, Samuel
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (05) : 859 - 893
  • [28] Minimalism in Cryptography: The Even-Mansour Scheme Revisited
    Dunkelman, Orr
    Keller, Nathan
    Shamir, Adi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 336 - 354
  • [29] Slidex Attacks on the Even-Mansour Encryption Scheme
    Dunkelman, Orr
    Keller, Nathan
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2015, 28 (01) : 1 - 28
  • [30] Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
    Fouque, Pierre-Alain
    Joux, Antoine
    Mavromati, Chrysanthi
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 420 - 438