how to construct an ideal cipher from a small set of
play

How to Construct an Ideal Cipher from a Small Set of Public - PowerPoint PPT Presentation

How to Construct an Ideal Cipher from a Small Set of Public Permutations Rodolphe Lampe and Yannick Seurin University of Versailles and ANSSI ASIACRYPT 2013 December 3, 2013 Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public


  1. How to Construct an Ideal Cipher from a Small Set of Public Permutations Rodolphe Lampe and Yannick Seurin University of Versailles and ANSSI ASIACRYPT 2013 — December 3, 2013 Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 1 / 38

  2. Summary Summary We show how to construct an ideal cipher from a small set of n -bit public random permutations { P 1 , . . . , P r } The construction we consider is the single-key iterated Even-Mansour cipher ( aka key-alternating cipher) with 12 rounds: k k k y x P 1 P 2 P 12 ⇒ this yields a family of 2 n permutations indexed by the n -bit key k from only 12 public n -bit permutations We show that this construction “behaves” as an ideal cipher with n -bit blocks and n -bit keys using the indifferentiability framework We also show that at least 4 rounds are necessary to achieve indifferentiability from an ideal cipher Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 2 / 38

  3. Summary Summary We show how to construct an ideal cipher from a small set of n -bit public random permutations { P 1 , . . . , P r } The construction we consider is the single-key iterated Even-Mansour cipher ( aka key-alternating cipher) with 12 rounds: k k k y x P 1 P 2 P 12 ⇒ this yields a family of 2 n permutations indexed by the n -bit key k from only 12 public n -bit permutations We show that this construction “behaves” as an ideal cipher with n -bit blocks and n -bit keys using the indifferentiability framework We also show that at least 4 rounds are necessary to achieve indifferentiability from an ideal cipher Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 2 / 38

  4. Summary Summary We show how to construct an ideal cipher from a small set of n -bit public random permutations { P 1 , . . . , P r } The construction we consider is the single-key iterated Even-Mansour cipher ( aka key-alternating cipher) with 12 rounds: k k k y x P 1 P 2 P 12 ⇒ this yields a family of 2 n permutations indexed by the n -bit key k from only 12 public n -bit permutations We show that this construction “behaves” as an ideal cipher with n -bit blocks and n -bit keys using the indifferentiability framework We also show that at least 4 rounds are necessary to achieve indifferentiability from an ideal cipher Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 2 / 38

  5. Summary Summary We show how to construct an ideal cipher from a small set of n -bit public random permutations { P 1 , . . . , P r } The construction we consider is the single-key iterated Even-Mansour cipher ( aka key-alternating cipher) with 12 rounds: k k k y x P 1 P 2 P 12 ⇒ this yields a family of 2 n permutations indexed by the n -bit key k from only 12 public n -bit permutations We show that this construction “behaves” as an ideal cipher with n -bit blocks and n -bit keys using the indifferentiability framework We also show that at least 4 rounds are necessary to achieve indifferentiability from an ideal cipher Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 2 / 38

  6. Outline Outline Background on the Iterated Even-Mansour Cipher 1 Indifferentiability of the IEM cipher 2 Formalizing the problem Which key schedule? At least 4 rounds are necessary Indifferentiability proof for 12 rounds 3 Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 3 / 38

  7. Background on the Iterated Even-Mansour Cipher Outline Background on the Iterated Even-Mansour Cipher 1 Indifferentiability of the IEM cipher 2 Formalizing the problem Which key schedule? At least 4 rounds are necessary Indifferentiability proof for 12 rounds 3 Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 4 / 38

  8. Background on the Iterated Even-Mansour Cipher Iterated Even-Mansour cipher ( aka key-alternating cipher) Iterated Even-Mansour (IEM) with r rounds: K K K γ 0 γ 1 γ r y x P 1 P 2 P r The P i ’s are public permutations on { 0 , 1 } n K ∈ { 0 , 1 } ℓ is the (master) key The γ i ’s are key derivation functions mapping K to n -bit values Also named key-alternating cipher Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 5 / 38

  9. Background on the Iterated Even-Mansour Cipher Iterated Even-Mansour cipher ( aka key-alternating cipher) Iterated Even-Mansour (IEM) with r rounds: K K K γ 0 γ 1 γ r y x P 1 P 2 P r The P i ’s are public permutations on { 0 , 1 } n K ∈ { 0 , 1 } ℓ is the (master) key The γ i ’s are key derivation functions mapping K to n -bit values Also named key-alternating cipher Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 5 / 38

  10. Background on the Iterated Even-Mansour Cipher Iterated Even-Mansour cipher ( aka key-alternating cipher) Most (if not all) SPN ciphers can be described as key-alternating ciphers. E.g. for AES-128, one has r = 10, the γ i ’s are efficiently invertible permutations, and: P 1 = . . . = P 9 = SubBytes ◦ ShiftRows ◦ MixColumns P 10 = SubBytes ◦ ShiftRows When the P i ’s are fixed permutations, one can prove results like: the best differential characteristic over r ′ < r rounds has probability at most p the best linear approximation over r ′ < r rounds has probability at most p ′ This gives upper bounds on the distinguishing probability of very specific adversaries Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 6 / 38

  11. Background on the Iterated Even-Mansour Cipher Iterated Even-Mansour cipher ( aka key-alternating cipher) Most (if not all) SPN ciphers can be described as key-alternating ciphers. E.g. for AES-128, one has r = 10, the γ i ’s are efficiently invertible permutations, and: P 1 = . . . = P 9 = SubBytes ◦ ShiftRows ◦ MixColumns P 10 = SubBytes ◦ ShiftRows When the P i ’s are fixed permutations, one can prove results like: the best differential characteristic over r ′ < r rounds has probability at most p the best linear approximation over r ′ < r rounds has probability at most p ′ This gives upper bounds on the distinguishing probability of very specific adversaries Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 6 / 38

  12. Background on the Iterated Even-Mansour Cipher Analysis in the Random Permutation Model (RPM) Recently, a lot of results have been obtained in the Random Permutation Model: the P i ’s are viewed as oracles to which the adversary can make black-box queries (both to P i and P − 1 ). i Interpretation: gives a guarantee against any adversary which does not use particular properties of the P i ’s In fact, this model was already considered 15 years ago by Even and Mansour for r = 1 round: they showed that the following cipher is pseudorandom up to O ( 2 n / 2 ) queries of the adversary, when P 1 is a public random permutation: k 0 k 1 y x P 1 Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 7 / 38

  13. Background on the Iterated Even-Mansour Cipher Analysis in the Random Permutation Model (RPM) Recently, a lot of results have been obtained in the Random Permutation Model: the P i ’s are viewed as oracles to which the adversary can make black-box queries (both to P i and P − 1 ). i Interpretation: gives a guarantee against any adversary which does not use particular properties of the P i ’s In fact, this model was already considered 15 years ago by Even and Mansour for r = 1 round: they showed that the following cipher is pseudorandom up to O ( 2 n / 2 ) queries of the adversary, when P 1 is a public random permutation: k 0 k 1 y x P 1 Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 7 / 38

  14. Background on the Iterated Even-Mansour Cipher Pseudorandomness of the IEM cipher (in the RPM) The following results have been successively obtained for the pseudorandomness of the IEM cipher (notation: N = 2 n ): 1 2 ) queries [EM97] for r = 1 round, security up to O ( N 2 3 ) queries [BKL + 12] for r ≥ 2, security up to O ( N 3 4 ) queries [Ste13] for r ≥ 3, security up to O ( N r r + 2 ) queries [LPS12] for any even r , security up to O ( N r r + 1 ) queries [CS13] tight result: for r rounds, security up to O ( N Results for independent round keys ( k 0 , k 1 , . . . , k r ) k 0 k 1 k r y x P 1 P 2 P r Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 8 / 38

  15. Background on the Iterated Even-Mansour Cipher Pseudorandomness of the IEM cipher (in the RPM) The following results have been successively obtained for the pseudorandomness of the IEM cipher (notation: N = 2 n ): 1 2 ) queries [EM97] for r = 1 round, security up to O ( N 2 3 ) queries [BKL + 12] for r ≥ 2, security up to O ( N 3 4 ) queries [Ste13] for r ≥ 3, security up to O ( N r r + 2 ) queries [LPS12] for any even r , security up to O ( N r r + 1 ) queries [CS13] tight result: for r rounds, security up to O ( N Results for independent round keys ( k 0 , k 1 , . . . , k r ) k 0 k 1 k r y x P 1 P 2 P r Lampe & Seurin (UVSQ & ANSSI) Ideal Cipher from Public Permutations 8 / 38

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend