首页> 外文会议>International workshop on fast software encryption >Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
【24h】

Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes

机译:放宽全码本安全性:密钥扩展方案的精细分析

获取原文

摘要

We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Previous works typically considered the extreme case where the adversary is given the entire codebook of the construction, the only complexity measure being the number q_e of queries to the underlying ideal block cipher, representing adversary's secret-key-independent computation. Here, we initiate a systematic study of the more natural case of an adversary restricted to adaptively learning a number q_c of plaintext/ciphertext pairs that is less than the entire codebook. For any such q_c, we aim to determine the highest number of block-cipher queries q_e the adversary can issue without being able to successfully distinguish the construction (under a secret key) from a random permutation. More concretely, we show the following results for key-length extension schemes using a block cipher with n-bit blocks and κ-bit keys: 1. Plain cascades of length ℓ = 2r+1 are secure whenever q_cq_e~T () 2~(r(κ+n)), q_c () 2~κ and q_e () 2~(2κ). The bound for r = 1 also applies to two-key triple encryption (as used within Triple DES). 2. The r-round XOR-cascade is secure as long as q_cq_e~T () 2~(r(κ+n)), matching an attack by Gazi (CRYPTO 2013). 3. We fully characterize the security of Gazi and Tessaro's two-call 2XOR construction (EUROCRYPT 2012) for all values of q_c, and note that the addition of a third whitening step strictly increases security for 2~(n/4) ≤ q_c ≤ 2~(3/4n). We also propose a variant of this construction without re-keying and achieving comparable security levels.
机译:我们将重新研究基于级联结构的安全性(作为伪随机排列),以用于块密码密钥长度扩展。先前的工作通常考虑了极端情况,即为对手提供了结构的整个密码本,唯一的复杂性度量是对基础理想分组密码的查询次数q_e,代表了对手的独立于密钥的计算。在这里,我们开始系统地研究对手的更自然的情况,这种情况仅限于自适应地学习数量小于整个密码本的明文/密文对的数量q_c。对于任何这样的q_c,我们旨在确定对手可以发出的块密码查询的最大数量q_e,而又不能成功地将构造(在密钥下)与随机排列区分开。更具体地讲,对于具有n位块和κ位密钥的分组密码,我们针对密钥长度扩展方案显示以下结果:1.每当q_cq_e〜T(<<)时,长度为ℓ= 2r + 1的简单级联是安全的。 2〜(r(κ+ n)),q_c(<<)2〜κ和q_e(<<)2〜(2κ)。 r = 1的界限也适用于两键三重加密(在三重DES中使用)。 2.只要q_cq_e〜T(<<)2〜(r(κ+ n)),r轮XOR级联就是安全的,与Gazi的攻击相匹配(CRYPTO 2013)。 3.对于q_c的所有值,我们充分表征了Gazi和Tessaro的两次调用2XOR构造(EUROCRYPT 2012)的安全性,并注意,添加第三步增白步骤严格提高了2〜(n / 4)≤q_c≤的安全性。 2〜(3 / 4n)。我们还提出了这种结构的变体,而无需重新输入密钥并达到可比较的安全级别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号