Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption

نویسنده

  • Jooyoung Lee
چکیده

This paper discusses provable security of two types of cascade encryptions. The first construction CE, called l-cascade encryption, is obtained by sequentially composing l blockcipher calls with independent keys. The security of CE has been a longstanding open problem until Gaži and Maurer [9] proved its security up to 2κ+min{ n 2 ,κ} query complexity for large cascading length, where κ and n denote the key size and the block size of the underlying blockcipher, respectively. We improve this limit by proving the security of CE up to 2κ+min{κ,n}− 16 l ( n 2 +2) query complexity: this bound approaches 2κ+min{κ,n} with increasing cascade length l. The second construction XCE is a natural cascade version of the DESX scheme with intermediate keys xored between blockcipher calls. This can also be viewed as an extension of double XOR-cascade proposed by Gaži and Tessaro [10]. We prove that XCE is secure up to 2κ+n− 8 l ( n 2 +2) query complexity. As cascade length l increases, this bound approaches 2. In the ideal cipher model, one can obtain all the evaluations of the underlying blockcipher by making 2 queries, so the (κ+ n)-bit security becomes the maximum that key-length extension based on a single κ-bit key n-bit blockcipher is able to achieve. Cascade encryptions CE (with n ≤ κ) and XCE provide almost optimal security with large cascade length.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers

Cascading-based constructions represent the predominant approach to the problem of keylength extension for block ciphers. Besides the plain cascade, existing works also consider its modification containing key-whitening steps between the invocations of the block cipher, called randomized cascade or XOR-cascade. We contribute to the understanding of the security of these two designs by giving th...

متن کامل

Tight Security Bounds for Triple Encryption

In this paper, we revisit the long-standing open problem asking the exact provable security of triple encryption in the ideal cipher model. For a blockcipher with key length κ and block size n, triple encryption is known to be provably secure up to 2 1 2 min{κ,n} queries, while the best attack requires 2κ+min{κ, n 2 } query complexity. So there has been a gap between the upper and lower bounds ...

متن کامل

Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes

We revisit the security (as a pseudorandom permutation) ofcascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversary isgiven the entire codebook of the construction, the only complexity mea-sure being the number qe of queries to the underlying ideal block cipher,representing adversary’s secre...

متن کامل

Functional encryption for cascade automata

We introduce a functional encryption scheme based on the security of bilinear maps for the class of languages accepted by extended automata. In such an automaton, n DFAs, each with at most q states, are linked in a cascade such that the first DFA receives the input to the system and a feedback symbol from the last DFA, and in each transition the i-th DFA, i = 1, . . . , n, both performs its own...

متن کامل

Cascade Encryption Revisited

The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that double encryption improves the security only marginally, leaving triple encryption as the shortest reasonable cascade. In a recent paper, Bellare and Rogaway showed that in the ideal cipher model, triple encryption is significantl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013