Composition Theorems for CCA Cryptographic Security

ثبت نشده
چکیده

We present two new theorems to analyze the indistinguishability of the composition of cryptographic permutations and the indistinguishability of the XOR of cryptographic functions. Using the H Coefficients technique of [Pat01], for any two families of permutations F and G with CCA distinghuishability advantage ≤ αF and ≤ αG, we prove that the set of permutations f ◦ g, f ∈ F, g ∈ G has CCA distinguishability advantage ≤ αF × αG. This simple composition result gives a CCA indistinguishability geometric gain when composing blockciphers (unlike previously known clasical composition theorems). As an example, we apply this new theorem to analyze 4r and 6r rounds Feistel schemes with r ≥ 1 and we improve previous best known bounds for a certain range of queries. Similarly, for any two families of functions F and G with distinghuishability advantage ≤ αF and ≤ αG, we prove that the set of functions f ⊕ g, f ∈ F, g ∈ G has distinguishability advantage ≤ αF × αG. As an example, we apply this new theorem to analyze the XOR of 2r permutations and we improve the previous best known bounds for certain range of queries.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

(De)Compositions of Cryptographic Schemes and their Applications to Protocols

The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, signature and hashing. Moreover, message forwarding and private key transmission are allowed. To our knowledge this is the first result that deals with hash functions and the combination of these crypt...

متن کامل

On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?

In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features may be achieved by multiple encrypting a message, such as the key-insulated cryptosystems and anonymous channels. Intuitively, a multiple encryption should remain “secure”, whenever there is one component cipher unbreak...

متن کامل

On Modeling IND-CCA Security in Cryptographic Protocols

Two common notions of security for public key encryption schemes are shown to be equivalent: we prove that indistinguishability against chosen-ciphertext attacks (IND-CCA) is in fact polynomially equivalent to (yet “slightly” weaker than) securely realizing the ideal functionality FPKE in the general modeling of cryptographic protocols of [Can01a]. This disproves in particular the claim that se...

متن کامل

Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms

In this paper, we introduce and study a new cryptographic primitive that we call puncturable key encapsulation mechanism (PKEM), which is a special class of KEMs that satisfy some functional and security requirements that, combined together, imply chosen ciphertext security (CCA security). The purpose of introducing this primitive is to capture certain common patterns in the security proofs of ...

متن کامل

A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol

P. Samarati, D. Gollmann, and R. Molva (Eds.): ESORICS 2004, LCNS 3193, pages 89 108, September 2004. c © Springer-Verlag Berlin Heidelberg 2004. Abstract. We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active attacks including concurrent protocol runs if it is implemented u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013