首页> 外文会议>Annual international conference on the theory and applications of cryptographic techniques >On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
【24h】

On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy

机译:关于置换置换网络的一般化:HADES设计策略

获取原文

摘要

Keyed and unkeyed cryptographic permutations often iterate simple round functions. Substitution-permutation networks (SPNs) are an approach that is popular since the mid 1990s. One of the new directions in the design of these round functions is to reduce the substitution (S-Box) layer from a full one to a partial one, uniformly distributed over all the rounds. LowMC and Zorro are examples of this approach. A relevant freedom in the design space is to allow for a highly non-uniform distribution of S-Boxes. However, choosing rounds that are so different from each other is very rarely done, as it makes security analysis and implementation much harder. We develop the design strategy Hades and an analysis framework for it, which despite this increased complexity allows for security arguments against many classes of attacks, similar to earlier simpler SPNs. The framework builds upon the wide trail design strategy, and it additionally allows for security arguments against algebraic attacks, which are much more of a concern when algebraically simple S-Boxes are used. Subsequently, this is put into practice by concrete instances and benchmarks for a use case that generally benefits from a smaller number of S-Boxes and showcases the diversity of design options we support: A candidate cipher natively working with objects in GF(p), for securing data transfers with distributed databases using secure multiparty computation (MPC). Compared to the currently fastest design MiMC, we observe significant improvements in online bandwidth requirements and throughput with a simultaneous reduction of preprocessing effort, while having a comparable online latency.
机译:键控和非键控密码排列通常会迭代简单的舍入函数。自1990年代中期以来,替代置换网络(SPN)是一种流行的方法。这些回合函数设计的新方向之一是将替换(S-Box)层从完整层减少为部分层,并在所有回合中均匀分布。 LowMC和Zorro是这种方法的示例。设计空间中的一个相关自由是允许S-Box的高度不均匀分布。但是,很少选择彼此不同的回合,因为这会使安全性分析和实施变得更加困难。我们开发了设计策略Hades及其分析框架,尽管这种复杂性增加了,但仍可以针对许多类型的攻击进行安全性论证,类似于早期的更简单的SPN。该框架建立在宽径设计策略的基础上,并且还允许针对代数攻击的安全性论证,当使用代数简单的S-Box时,这是一个值得关注的问题。随后,针对具体的用例和基准,将其付诸实践,该用例通常受益于较少的S-Box,并展示了我们支持的设计选项的多样性:一种候选密码,该密码与GF(p)中的对象一起自然工作,使用安全的多方计算(MPC)保护分布式数据库的数据传输安全。与目前最快的设计MiMC相比,我们发现在线带宽要求和吞吐量有了显着提高,同时减少了预处理工作,同时具有相当的在线等待时间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号