Generalized Tweakable Even-Mansour Cipher and Its Applications

被引:0
|
作者
Ping Zhang
Hong-Gang Hu
机构
[1] Chinese Academy of Sciences,Key Laboratory of Electromagnetic Space Information
[2] University of Science and Technology of China,School of Information Science and Technology
关键词
tweakable blockcipher; H-coefficients technique; authentication; authenticated encryption; provable security;
D O I
暂无
中图分类号
学科分类号
摘要
This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based on a public random permutation P and a family of almost-XOR-universal hash functions H=HKK∈K\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \mathcal{H}={\left\{ HK\right\}}_{K\in \mathcal{K}} $$\end{document} as a tweak and key schedule, and defined as y = HPHK((t1, t2), x) = P(x ⊕ HK(t1)) ⊕ HK(t2), where K is a key randomly chosen from a key space K\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \mathcal{K} $$\end{document}, (t1, t2) is a tweak chosen from a valid tweak space T\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \mathcal{T} $$\end{document}, x is a plaintext, and y is a ciphertext. We prove that HPH is a secure strong tweakable pseudorandom permutation (STPRP) by using H-coefficients technique. Then we focus on the security of HPH against multi-key and related-key attacks. We prove that HPH achieves both multi-key STPRP security and related-key STPRP security. HPH can be extended to wide applications. It can be directly applied to authentication and authenticated encryption modes. We apply HPH to PMAC1 and OPP, provide an improved authentication mode HPMAC and a new authenticated encryption mode OPH, and prove that the two modes achieve single-key security, multi-key security, and related-key security.
引用
收藏
页码:1261 / 1277
页数:16
相关论文
共 50 条
  • [41] Multi-key Security: The Even-Mansour Construction Revisited
    Mouha, Nicky
    Luykx, Atul
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 209 - 223
  • [42] Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
    Sakamoto, Kosei
    Minematsu, Kazuhiko
    Shibata, Nao
    Shigeri, Maki
    Kubo, Hiroyasu
    Funabiki, Yuki
    Bogdanov, Andrey
    Morioka, Sumio
    Isobe, Takanori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (12) : 1629 - 1639
  • [43] Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
    Sakamoto, Kosei
    Minematsu, Kazuhiko
    Shibata, Nao
    Shigeri, Maki
    Kubo, Hiroyasu
    Funabiki, Yuki
    Bogdanov, Andrey
    Morioka, Sumio
    Isobe, Takanori
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019, 2019, 11689 : 129 - 145
  • [44] Minimizing the Two-Round Even–Mansour Cipher
    Shan Chen
    Rodolphe Lampe
    Jooyoung Lee
    Yannick Seurin
    John Steinberger
    Journal of Cryptology, 2018, 31 : 1064 - 1119
  • [45] Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules)
    Xu, Shanjie
    Da, Qi
    Guo, Chun
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 125 - 145
  • [46] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Hosoyamada, Akinori
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 27 - 34
  • [47] Quantum Attacks on Sum of Even-Mansour Construction with Linear Key Schedules
    Zhang, Ping
    ENTROPY, 2022, 24 (02)
  • [48] 密钥泄露下Even-Mansour密码的滑动攻击
    杨光
    张平
    胡红钢
    信息安全研究, 2018, 4 (06) : 518 - 525
  • [49] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Hosoyamada, Akinori
    Aoki, Kazumaro
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 3 - 18
  • [50] A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
    Guo, Chun
    Lin, Dongdai
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 389 - 410