Composition Theorems for CCA Cryptographic Security
ثبت نشده
چکیده
We present two new theorems to analyze the indistinguishability of the composition of cryptographic permutations and the indistinguishability of the XOR of cryptographic functions. Using the H Coefficients technique of [Pat01], for any two families of permutations F and G with CCA distinghuishability advantage ≤ αF and ≤ αG, we prove that the set of permutations f ◦ g, f ∈ F, g ∈ G has CCA distinguishability advantage ≤ αF × αG. This simple composition result gives a CCA indistinguishability geometric gain when composing blockciphers (unlike previously known clasical composition theorems). As an example, we apply this new theorem to analyze 4r and 6r rounds Feistel schemes with r ≥ 1 and we improve previous best known bounds for a certain range of queries. Similarly, for any two families of functions F and G with distinghuishability advantage ≤ αF and ≤ αG, we prove that the set of functions f ⊕ g, f ∈ F, g ∈ G has distinguishability advantage ≤ αF × αG. As an example, we apply this new theorem to analyze the XOR of 2r permutations and we improve the previous best known bounds for certain range of queries.
منابع مشابه
(De)Compositions of Cryptographic Schemes and their Applications to Protocols
The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, signature and hashing. Moreover, message forwarding and private key transmission are allowed. To our knowledge this is the first result that deals with hash functions and the combination of these crypt...
متن کاملOn the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features may be achieved by multiple encrypting a message, such as the key-insulated cryptosystems and anonymous channels. Intuitively, a multiple encryption should remain “secure”, whenever there is one component cipher unbreak...
متن کاملOn Modeling IND-CCA Security in Cryptographic Protocols
Two common notions of security for public key encryption schemes are shown to be equivalent: we prove that indistinguishability against chosen-ciphertext attacks (IND-CCA) is in fact polynomially equivalent to (yet “slightly” weaker than) securely realizing the ideal functionality FPKE in the general modeling of cryptographic protocols of [Can01a]. This disproves in particular the claim that se...
متن کاملConstructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
In this paper, we introduce and study a new cryptographic primitive that we call puncturable key encapsulation mechanism (PKEM), which is a special class of KEMs that satisfy some functional and security requirements that, combined together, imply chosen ciphertext security (CCA security). The purpose of introducing this primitive is to capture certain common patterns in the security proofs of ...
متن کاملA Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
P. Samarati, D. Gollmann, and R. Molva (Eds.): ESORICS 2004, LCNS 3193, pages 89 108, September 2004. c © Springer-Verlag Berlin Heidelberg 2004. Abstract. We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active attacks including concurrent protocol runs if it is implemented u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013