Tweakable Block Cipher Secure Beyond the Birthday Bound in the Ideal Cipher Model
*Byeonghak Lee, Jooyoung Lee
KAIST
Birthday Bound in the Ideal Cipher Model *Byeonghak Lee, Jooyoung - - PowerPoint PPT Presentation
Tweakable Block Cipher Secure Beyond the Birthday Bound in the Ideal Cipher Model *Byeonghak Lee, Jooyoung Lee KAIST Outline Tweakable block ciphers Our contribution Proof overview Conclusion 2 Tweakable Block Ciphers (TBCs)
KAIST
2
3
๏ A tweakable block cipher เทจ ๐น accepts an additional input โtweakโ
๏ Dedicated construction
TWEAKEY framework, etc.
๏ Permutation-based construction
๏ Block cipher-based construction
5
๏ Using fixed keys (independent of tweaks)
random permutation (up to the security of TBC)
๏ Using tweak-dependent keys
uses a lightweight key schedule
6
With ๐-bit block cipher using ๐-bit keys, ๏ เทจ ๐บ 1 is secure up to 22๐/3 queries
๏ เทจ ๐บ[2] is secure up to 2๐ queries
เทจ ๐บ 1 เทจ ๐บ 2
7
With ๐-bit block cipher using ๐-bit keys, ๏ เทจ ๐บ 1 is secure up to 22๐/3 queries
๏ เทจ ๐บ[2] is secure up to 2๐ queries
๏ Both uses tweak dependent keys
เทจ ๐บ 1 เทจ ๐บ 2
8
With ๐-bit block cipher using ๐-bit keys, ๏ only xor operation is used ๏ secure up to 2๐ queries
9
With ๐-bit block cipher using ๐-bit keys, ๏ only xor operation is used ๏ secure up to 2๐ queries
10
Can be precomputed and viewed as a subkey
๏ XHX uses two types of hash functions
๏ ๐ and โ are keyed hash function generated from the master key, but we omit the key and view them as secret key of the construction ๏ With ๐-bit block cipher using ๐-bit keys, XHX is secure up to 2
๐+๐ 2
queries
๐ ๐
11
12
๏ The input size of an ๐-bit block cipher using ๐-bit key is ๐ + ๐ bits ๏ In the ideal cipher model, its information-theoretic security cannot go beyond ๐ + ๐ bits (due to key exhaustive search) ๏ With respect to this size, the birthday bound should be
๐+๐ 2
13
๏ The input size of an ๐-bit block cipher using ๐-bit key is ๐ + ๐ bits ๏ In the ideal cipher model, its information-theoretic security cannot go beyond ๐ + ๐ bits (due to key exhaustive search) ๏ With respect to this size, the birthday bound should be
๐+๐ 2
๏ Can we go beyond the birthday bound?
14
๏ Cascade of two independent copies of XHX
๐น1 ๐1(๐ข) ๐ฆ โ1(๐ข) ๐น2 ๐2(๐ข) โ2(๐ข) ๐ง
๏ Cascade of two independent copies of XHX
๐น1 ๐1(๐ข) ๐ฆ โ1(๐ข) ๐น2 ๐2(๐ข) โ2(๐ข) ๐ง
โจ (finite field mult) can be used
๏ Cascade of two independent copies of XHX
๐น1 ๐1(๐ข) ๐ฆ โ1(๐ข) ๐น2 ๐2(๐ข) โ2(๐ข) ๐ง
If ๐ข = ๐, โจ can be used else, โจ can be used
๏ Cascade of two independent copies of XHX
๏ Secure up to 2min 2 ๐+๐
3
,๐+๐
2
queries
๏ If ๐ โค 2๐, min
2 ๐+๐ 3
, ๐ +
๐ 2
=
2 ๐+๐ 3
๐น1 ๐1(๐ข) ๐ฆ โ1(๐ข) ๐น2 ๐2(๐ข) โ2(๐ข) ๐ง
When ๐1 and ๐2 are ๐-bit ๐-almost uniform and xor-universal hash functions, and โ1 and โ2 are ๐-bit ๐โฒ-almost uniform and universal hash functions, one has where ๐ โ
1 2๐ , ๐โฒ โ 1 2๐, ๐ and ๐ are the number of queries to underlying
block ciphers and construction
19
Construction Key size Security Efficiency Ref. E โจ/H LRW 2๐ ๐/2 1 1 [LRW02] LRW[2] 4๐ 2๐/3, (or 3๐/4) 2 2 [LST12, Men18] LRW[s] 2๐ก๐ ๐ก๐/(๐ก + 2) ๐ก ๐ก [LS13] เทจ ๐บ[1] ๐ 2๐/3 1 1 [Men15] เทจ ๐บ[2] ๐ ๐ 2 [Men15] เทช ๐น1, โฏ , เทช ๐น32 ๐ ๐ 2 [Lei+16] XHX ๐ + ๐ (๐ + ๐)/2 1 1 [Jha+ 17] XHX2 2๐ + 2๐ ๐๐๐(2(๐ + ๐)/3, ๐ + ๐/2) 2 2 Our work
20
๏ XTX is a tweak-length extension scheme (Minematsu and Iwata, IMACC 2015) ๏ Without allowing block cipher queries (๐ = 0), we can prove beyond-birthday- bound security for the cascade of two independent XTX constructions.
เทจ ๐น๐ฟ1 ๐1(๐ข) ๐ฆ โ1(๐ข) เทจ ๐น๐ฟ2 ๐2(๐ข) โ2(๐ข) ๐ง
๐(๐ข) ๐ฆ โ(๐ข) ๐ง
21
22
๐ = ๐ ๐ท = ๐ข1, ๐ฆ1, ๐ง1 , โฏ , ๐ข๐, ๐ฆ๐, ๐ง๐ , ๐ ๐น๐ = ๐, ๐1, ๐ฃ1, ๐ค1 , โฏ , ๐, ๐๐, ๐ฃ๐, ๐ค๐
23
๐น1/๐น2
เทจ ๐
๐น1/๐น2
Real world Ideal world Real? or Ideal?
๐น1
๐1(๐ข)
๐ฆ
โ1(๐ข)
๐น2
๐2(๐ข) โ2(๐ข)
๐ง
๐ = ๐ ๐ท = ๐ข1, ๐ฆ1, ๐ง1 , โฏ , ๐ข๐, ๐ฆ๐, ๐ง๐ , ๐ ๐น๐ = ๐, ๐1, ๐ฃ1, ๐ค1 , โฏ , ๐, ๐๐, ๐ฃ๐, ๐ค๐ , ๐1, ๐2, โ1, โ2
24
๐น1/๐น2
เทจ ๐
๐น1/๐น2
Real world Ideal world Real? or Ideal?
๐น1
๐1(๐ข)
๐ฆ
โ1(๐ข)
๐น2
๐2(๐ข) โ2(๐ข)
๐ง
Assume to be revealed after the attack is finished
๏ Tid : Probability distribution of ฯ in the ideal world ๏ Tre : Probability distribution of ฯ in the real world ๐๐๐ฐ เทจ
๐น ๐ โค
Tid โ Tre
Transcripts 1 Probability to appear real ideal
25
We can use following lemma to upper bound the statistical distance Patarinโs H-coefficient lemma (informal) 1) Define bad transcripts ฮbad
2) With ๐ โ ฮbad
Pr Tid=๐ โฅ 1 โ ฯต2
26
1) Give free queries to the adversary 2) Define bad transcripts 3) Lower bound the ratio of probabilities of obtaining a good transcript in the real world and in the ideal world
4) Apply the H-coefficient lemma
27
๏ Reduced query: combine keys and construction queries
๐ข, ๐ฆ, ๐ง โฆ โ1 ๐ข , โ2 ๐ข , ๐ฆโจ๐1 ๐ข , ๐งโจ๐2 ๐ข , ๐1(๐ข)โจ๐2 ๐ข = (๐, ๐, ๐ฃ, ๐ค, ฮ)
28
๐น1 ๐1(๐ข) ๐ฆ โ1(๐ข) ๐น2 ๐2(๐ข) โ2(๐ข) ๐ง
๏ Black dots represent values fixed by block cipher queries, while white dots are โfreeโ
29
๐, ๐ฃ, ๐ค โ ๐ ๐น๐ ๐, ๐ฃ,โ โ ๐ ๐น๐
๏ To avoid the extreme cases;
give full evaluation of the block cipher with that key
give full evaluation of the construction with that tweak
๏ This increases the advantage by a constant factor, but it helps the computation of probability
30
๏ Avoid revealing any colliding internal path
it will fix the choice of remaining values (red dots)
31
โค ๐2 2๐+2๐
๏ Avoid large number of collisions
32
โค 2๐/4
๏ Classify good queries into 5 classes ๏ Estimate the probability of completing the queries in each class ๏ In this way, we can lower bound Pr Tre = ๐
33
๏ XHX2 is a TBC that is based on an ๐-bit block cipher using ๐-bit key providing min
2 ๐+๐ 3
, ๐ +
๐ 2 -bit security in the ideal cipher model
As open problems; ๏ Can we improve our security bound using an alternative approach (e.g., the expectation method)? ๏ What is the security of the 3-round XHX? ๏ Is our bound tight? (Generic attacks matching the provable security?)
34
35