Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks
Ryota Nakamichi and Tetsu Iwata
Nagoya University, Japan
FSE 2020 November 9–13, 2020, Virtual
1 / 19
Iterative Block Ciphers from Tweakable Block Ciphers with Long - - PowerPoint PPT Presentation
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks Ryota Nakamichi and Tetsu Iwata Nagoya University, Japan FSE 2020 November 913, 2020, Virtual 1 / 19 Block Ciphers block cipher (BC) E : K { 0 , 1 } n { 0
Nagoya University, Japan
1 / 19
2 / 19
K ), EK ∈ Perm(n), n-BC
E
K ⇒ 1] − Pr[AΠ,Π−1 ⇒ 1]
E
j
j
j
j
K
[LR88] Michael Luby and Charles Rackoff. How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM J. Comput., 1988 3 / 19
[Pat04] Jacques Patarin. Security of Random Feistel Schemes with 5 or More Rounds. CRYPTO 2004 [MP03] Ueli M. Maurer and Krzysztof Pietrzak. The Security of Many-Round Luby- Rackoff Pseudo-Random Permutations. EUROCRYPT 2003 [Min09] Kazuhiko Minematsu. Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. FSE 2009 4 / 19
[LRW02] Moses Liskov, Ronald L. Rivest, and David A. Wagner. Tweakable Block Ciphers. CRYPTO 2002 [Rog04] Phillip Rogaway. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. ASIACRYPT 2004 5 / 19
[CDMS10] Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, and Yannick Seurin. A Domain Extender for the Ideal Cipher. TCC 2010 [Min15] Kazuhiko Minematsu. Building blockcipher from small-block tweakable blockcipher. Des. Codes Cryptography, 2015 6 / 19
/ n / n 7 / 19
2
/ n / n / n / 3n
8 / 19
9 / 19
9 / 19
9 / 19
9 / 19
10 / 19
E
[Pat08] Jacques Patarin. The “Coefficients H” Technique. SAC 2008 [CS14] Shan Chen and John P. Steinberger. Tight Security Bounds for Key-Alternating Ciphers. EUROCRYPT 2014 11 / 19
12 / 19
13 / 19
13 / 19
i , S2 i , S3 i ) collides
i , S3 i , S4 i ) collides
14 / 19
i , . . . , Sd i ) collides
i , . . . , Sd+1 i
i
i
E
15 / 19
i , M 3 i , S1 i ) collides (impossible for an encryption query)
i , S1 i , C1 i ) collides
i , C1 i , C2 i ) collides (impossible for a decryption query)
16 / 19
E
17 / 19
18 / 19
[NI20b] Ryota Nakamichi and Tetsu Iwata. Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys. FSE 2020 19 / 19
[NI20b] Ryota Nakamichi and Tetsu Iwata. Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys. FSE 2020 19 / 19