Cascade Encryption Revisited

نویسندگان

  • Peter Gazi
  • Ueli Maurer
چکیده

The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that double encryption improves the security only marginally, leaving triple encryption as the shortest reasonable cascade. In a recent paper, Bellare and Rogaway showed that in the ideal cipher model, triple encryption is significantly more secure than single and double encryption, stating the security of longer cascades as an open question. In this paper, we propose a new lemma on the indistinguishability of systems extending Maurer’s theory of random systems. In addition to being of independent interest, it allows us to compactly rephrase Bellare and Rogaway’s proof strategy in this framework, thus making the argument more abstract and hence easy to follow. As a result, this allows us to address the security of longer cascades as well as some errors in their paper. Our result implies that for blockciphers with smaller key space than message space (e.g. DES), longer cascades improve the security of the encryption up to a certain limit. This partially answers the open question mentioned above.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption

This paper discusses provable security of two types of cascade encryptions. The first construction CE, called l-cascade encryption, is obtained by sequentially composing l blockcipher calls with independent keys. The security of CE has been a longstanding open problem until Gaži and Maurer [9] proved its security up to 2κ+min{ n 2 ,κ} query complexity for large cascading length, where κ and n d...

متن کامل

Functional encryption for cascade automata

We introduce a functional encryption scheme based on the security of bilinear maps for the class of languages accepted by extended automata. In such an automaton, n DFAs, each with at most q states, are linked in a cascade such that the first DFA receives the input to the system and a feedback symbol from the last DFA, and in each transition the i-th DFA, i = 1, . . . , n, both performs its own...

متن کامل

Image Encryption Using Chaotic Maps of Various Dimensions: Review

Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiali...

متن کامل

Management implications of the Macquarie Island trophic cascade revisited: a reply to Dowding et al. (2009)

Management implications of the Macquarie Island trophic cascade revisited: a reply to Dowding et al. (2009) Dana M. Bergstrom*, Arko Lucieer, Kate Kiefer, Jane Wasley, Lee Belbin, Tore K. Pedersen and Steven L. Chown Australian Antarctic Division, Department of the Environment, Water, Heritage and the Arts, 203 Channel Highway, Kingston 7050, Australia; School of Geography and Environmental Stu...

متن کامل

CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control

Mass surveillance and a lack of end-user encryption, coupled with a growing demand for key escrow under legal oversight and certificate authority security concerns, raise the question of the appropriateness of continued general dependency on PKI. Under this context, we examine Identity-Based Encryption (IBE) as an alternative to publickey encryption. Cascade encryption, or sequential multiple e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009