【24h】

Luby-Rackoff Ciphers from Weak Round Functions?

机译:弱轮函数的Luby-Rackoff密码?

获取原文
获取原文并翻译 | 示例

摘要

The Feistel-network is a popular structure underlying many block-ciphers where the cipher is constructed from many simpler rounds, each defined by some function which is derived from the secret key. Luby and Rackoff showed that the three-round Feistel-network - each round instantiated with a pseudorandom function secure against adaptive chosen plaintext attacks (CPA) - is a CPA secure pseudorandom permutation, thus giving some confidence in the soundness of using a Feistel-network to design block-ciphers. But the round functions used in actual block-ciphers are - for efficiency reasons - far from being pseudorandom. We investigate the security of the Feistel-network against CPA distinguishers when the only security guarantee we have for the round functions is that they are secure against non-adaptive chosen plaintext attacks (nCPA). We show that in the information-theoretic setting, four rounds with nCPA secure round functions are sufficient (and necessary) to get a CPA secure permutation. Unfortunately, this result does not translate into the more interesting pseudorandom setting. In fact, under the so-called Inverse Decisional Diffie-Hellman assumption the Feistel-network with four rounds, each instantiated with a nCPA secure pseudorandom function, is in general not a CPA secure pseudorandom permutation.
机译:Feistel网络是一种流行的结构,它基于许多分组密码,其中密码是由许多较简单的回合构成的,每个回合均由从秘密密钥派生的某些功能定义。 Luby和Rackoff指出,三轮Feistel网络(每轮以伪随机函数实例化,以抵抗自适应选择的明文攻击(CPA))是CPA安全的伪随机排列,因此对使用Feistel网络的安全性充满信心设计分组密码。但是出于效率原因,实际的分组密码中使用的舍入函数不是伪随机的。当我们具有全面功能的唯一安全保证是针对非自适应选择明文攻击(nCPA)的安全性时,我们将研究Feistel网络针对CPA识别器的安全性。我们证明,在信息论的背景下,具有nCPA安全回合功能的四个回合足以(并且有必要)获得CPA安全置换。不幸的是,这个结果并没有转化为更有趣的伪随机设置。实际上,在所谓的逆决策Diffie-Hellman假设下,具有四个回合的Feistel网络,每个回合都使用nCPA安全伪随机函数实例化,通常不是CPA安全伪随机置换。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号