首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
【24h】

How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers

机译:如何从古典块壁层构建完全安全的调节块

获取原文

摘要

This paper focuses on building a tweakable blockcipher from a classical blockcipher whose input and output wires all have a size of n bits. The main goal is to achieve full 2~n security. Such a tweakable blockcipher was proposed by Mennink at FSE'15, and it is also the only tweakable blockcipher so far that claimed full 2~n security to our best knowledge. However, we find a key-recovery attack on Mennink's proposal (in the proceeding version) with a complexity of about 2~(n/2) adversarial queries. The attack well demonstrates that Mennink's proposal has at most 2~(n/2) security, and therefore invalidates its security claim. In this paper, we study a construction of tweakable blockciphers denoted as E[s] that is built on s invocations of a blockcipher and additional simple XOR operations. As proven in previous work, at least two invocations of blockcipher with linear mixing are necessary to possibly bypass the birthday-bound barrier of 2~(n/2) security, we carry out an investigation on the instances of E[s] with s ≥ 2, and find 32 highly efficient tweakable blockciphers E1, E2, ..., E32 that achieve 2~n provable security. Each of these tweakable blockciphers uses two invocations of a blockcipher, one of which uses a tweak-dependent key generated by XORing the tweak to the key (or to a secret subkey derived from the key). We point out the provable security of these tweakable blockciphers is obtained in the ideal blockcipher model due to the usage of the tweak-dependent key.
机译:本文重点介绍从经典块密封构建可调节的块密封,其输入和输出线都具有n位的大小。主要目标是实现完整的2〜N安全性。这种可调节的块密封是由FSE15的Mennink提出的,并且它也是迄今为止的唯一可调调配的块密封,可以为我们的最佳知识索取完整的2〜N安全性。但是,我们在Mennink的提案(在程序中)找到了一个关键恢复攻击(在程序中),复杂性约为2〜(n / 2)对抗查询。攻击良好展示了Mennink的提案最多为2〜(n / 2)的安全性,因此无效其安全索赔。在本文中,我们研究了表示为e的调节块的结构,该井被构建在块密封和额外的简单XOR操作的S调用上。如前所述,在可能绕过2〜(N / 2)安全的生日束缚屏障,至少有两个具有线性混合的块密封的调用,我们对E的实例进行了调查≥2,找到32个高效的调节块E1,E2,...,E32,实现2〜N优化安全性。这些调节块COLKCIPHER中的每一个都使用块密封的两个调用,其中一个调用使用通过向键(或从键导出的秘密子项)xoring调整生成的依赖于依赖的密钥。我们指出,由于依赖于调整键的使用,在理想的块配置中获得了这些可调节块的可提供安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号