New tools in cryptography: mutually independent commitments, tweakable block ciphers, and plaintext awareness via key registration
نویسنده
چکیده
Cryptographic primitive research comprises much of the body of modern cryptographic research. This kind of research aims to produce useful primitives – building blocks with which we can design systems to enforce complex and subtle security requirements. Cryptographic primitive research often involves noticing a new problem that needs a simple solution, or a different way of setting up a problem; these in turn give rise to precise definitions for a primitive. In addition to this, cryptographic primitive research aims to provide the best, most efficient techniques for implementing each primitive, based on minimal computational assumptions. Our proposed research involves highlighting the advantages of this method of cryptographic research through certain specific examples. In particular, we plan to explore the following: • By refining our notion of what is necessary in a particular definition, we may achieve marked improvements in efficiency. The right tools are not always those that offer the most security or the strongest guarantees. This is exemplified by our work on mutually independent commitments. • By being realistic about the requirements of larger systems, we can design primitives which have the benefit of breaking down the job of solving larger problems in a better way. This simplifies the ultimate goal and allows us to focus our work on improving the efficiency of primitives towards improving certain important primitives. This is exemplified by our work on tweakable block ciphers. • By matching up cryptographic definitions with notions that appear in areas outside of traditional, computational complexity-based cryptography research, we can achieve a synergy that allows us to benefit from work others have done to solve problems we are both interested in. This is exemplified by our work on plaintext awareness via key registration. Thesis Supervisor: Silvio M. Micali Title: Professor
منابع مشابه
Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm
In symmetric-key cryptography, two parties share a secret key K to encrypt messages using a cipher. Symmetric encryption techniques are used to efficiently encrypt data. Two common types of ciphers are commonly used nowadays: block ciphers and stream ciphers. Block ciphers encrypt blocks of data (typically 64 or 128 bits) in a fixed key-dependent way. The design of block ciphers is a well-studi...
متن کاملNonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64
In this paper we introduce a new type of attack, called nonlinear invariant attack. As application examples, we present new attacks that are able to distinguish the full versions of the (tweakable) block ciphers Scream, iScream and Midori64 in a weak-key setting. Those attacks require only a handful of plaintext-ciphertext pairs and have minimal computational costs. Moreover, the nonlinear inva...
متن کاملOnline Ciphers from Tweakable Blockciphers
Online ciphers are deterministic length-preserving permutations EK : ({0, 1})+ → ({0, 1})+ where the i-th block of ciphertext depends only on the first i blocks of plaintext. Definitions, constructions, and applications for these objects were first given by Bellare, Boldyreva, Knudsen, and Namprempre. We simplify and generalize their work, showing that online ciphers are rather trivially constr...
متن کاملXHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
Tweakable block ciphers are important primitives for designing cryptographic schemes with high security. In the absence of a standardized tweakable block cipher, constructions built from classical block ciphers remain an interesting research topic in both theory and practice. Motivated by Mennink’s F̃ [2] publication from 2015, Wang et al. proposed 32 optimally secure constructions at ASIACRYPT’...
متن کاملContemporary Block Ciphers
This paper considers modern secret-key block ciphers. The theory behind the design and analysis of modern block ciphers is explained, and the most important known attacks are outlined. Finally the Advanced Encryption Standard is discussed. 1 Block Ciphers Introduction In the last few thousands of years encryption algorithms, also called ciphers, have been developed and used [18,28]. Many of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004