Tight security bounds for multiple encryption
نویسندگان
چکیده
Multiple encryption—the practice of composing a blockcipher several times with itself under independent keys—has received considerable attention of late from the standpoint of provable security. Despite these efforts proving definitive security bounds (i.e., with matching attacks) has remained elusive even for the special case of triple encryption. In this paper we close the gap by improving both the best known attacks and best known provable security, so that both bounds match. Our results apply for arbitrary number of rounds and show that the security of l-round multiple encryption is precisely exp(κ+min{κ(l − 2)/2), n(l − 2)/l}) where exp(t) = 2 and where l = 2⌈l/2⌉ is the even integer closest to l and greater than or equal to l, for all l ≥ 1. Our technique is based on Patarin’s H-coefficient method and reuses a combinatorial result of Chen and Steinberger originally required in the context of key-alternating ciphers.
منابع مشابه
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
Data stored in cloud storage sometimes requires long-term security due to its sensitivity (e.g.,genome data), and therefore, it also requires flexible access control for handling entities who canuse the data. Broadcast encryption can partially provide such flexibility by specifying privilegedreceivers so that only they can decrypt a ciphertext. However, once privileged receivers...
متن کاملTriple and Quadruple Encryption: Bridging the Gaps
Triple encryption is a cascade of three block cipher evaluations with independent keys, in order to enlarge its key size. This design is proven secure up to approximately 2κ+min{κ/2,n/2} queries (by Bellare and Rogaway, EUROCRYPT 2006, and Gaži and Maurer, ASIACRYPT 2009), where κ denotes the key size and n the block length of the underlying block cipher. On the other hand, the best known attac...
متن کاملSome Bounds and a Construction for Secure Broadcast Encryption
We rst present two tight lower bounds on the size of the secret keys of each user in an unconditionally secure one-time use broadcast encryption scheme (OTBES). Then we show how to construct a computa-tionally secure multiple-use broadcast encryption scheme (MBES) from a key predistribution scheme (KPS) by using the ElGamal cryptosystem. We prove that our MBES is secure against chosen (message,...
متن کاملTight Security Bounds for Triple Encryption
In this paper, we revisit the long-standing open problem asking the exact provable security of triple encryption in the ideal cipher model. For a blockcipher with key length κ and block size n, triple encryption is known to be provably secure up to 2 1 2 min{κ,n} queries, while the best attack requires 2κ+min{κ, n 2 } query complexity. So there has been a gap between the upper and lower bounds ...
متن کاملA Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. We give four di erent notions of security against chosen plaintext attack and analyze the concrete complexity of reductions among them, providing both upper and lower bounds, and obtaining tight relations. In this way we classify notions (even though polynomially reducible to each other) as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014