Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
نویسنده
چکیده
This paper discusses provable security of two types of cascade encryptions. The first construction CE, called l-cascade encryption, is obtained by sequentially composing l blockcipher calls with independent keys. The security of CE has been a longstanding open problem until Gaži and Maurer [9] proved its security up to 2κ+min{ n 2 ,κ} query complexity for large cascading length, where κ and n denote the key size and the block size of the underlying blockcipher, respectively. We improve this limit by proving the security of CE up to 2κ+min{κ,n}− 16 l ( n 2 +2) query complexity: this bound approaches 2κ+min{κ,n} with increasing cascade length l. The second construction XCE is a natural cascade version of the DESX scheme with intermediate keys xored between blockcipher calls. This can also be viewed as an extension of double XOR-cascade proposed by Gaži and Tessaro [10]. We prove that XCE is secure up to 2κ+n− 8 l ( n 2 +2) query complexity. As cascade length l increases, this bound approaches 2. In the ideal cipher model, one can obtain all the evaluations of the underlying blockcipher by making 2 queries, so the (κ+ n)-bit security becomes the maximum that key-length extension based on a single κ-bit key n-bit blockcipher is able to achieve. Cascade encryptions CE (with n ≤ κ) and XCE provide almost optimal security with large cascade length.
منابع مشابه
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
Cascading-based constructions represent the predominant approach to the problem of keylength extension for block ciphers. Besides the plain cascade, existing works also consider its modification containing key-whitening steps between the invocations of the block cipher, called randomized cascade or XOR-cascade. We contribute to the understanding of the security of these two designs by giving th...
متن کاملTight Security Bounds for Triple Encryption
In this paper, we revisit the long-standing open problem asking the exact provable security of triple encryption in the ideal cipher model. For a blockcipher with key length κ and block size n, triple encryption is known to be provably secure up to 2 1 2 min{κ,n} queries, while the best attack requires 2κ+min{κ, n 2 } query complexity. So there has been a gap between the upper and lower bounds ...
متن کاملRelaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
We revisit the security (as a pseudorandom permutation) ofcascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversary isgiven the entire codebook of the construction, the only complexity mea-sure being the number qe of queries to the underlying ideal block cipher,representing adversary’s secre...
متن کاملFunctional encryption for cascade automata
We introduce a functional encryption scheme based on the security of bilinear maps for the class of languages accepted by extended automata. In such an automaton, n DFAs, each with at most q states, are linked in a cascade such that the first DFA receives the input to the system and a feedback symbol from the last DFA, and in each transition the i-th DFA, i = 1, . . . , n, both performs its own...
متن کاملCascade Encryption Revisited
The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that double encryption improves the security only marginally, leaving triple encryption as the shortest reasonable cascade. In a recent paper, Bellare and Rogaway showed that in the ideal cipher model, triple encryption is significantl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013