Provable Security of (Tweakable) Block Ciphers Based on - - PowerPoint PPT Presentation

provable security of tweakable block ciphers based on
SMART_READER_LITE
LIVE PREVIEW

Provable Security of (Tweakable) Block Ciphers Based on - - PowerPoint PPT Presentation

Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks Benoit Cogliati Yevgeniy Dodis Jonathan Katz Jooyoung Lee John Steinberger John Steinberger Aishwarya Thiruvengadam Aishwarya Thiruvengadam Zhe Zhang


slide-1
SLIDE 1

Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks

Benoit Cogliati Yevgeniy Dodis Jonathan Katz Jooyoung Lee John Steinberger Aishwarya Thiruvengadam Zhe Zhang John Steinberger Aishwarya Thiruvengadam Zhe Zhang

1

slide-2
SLIDE 2

Block Ciphers

  • Building block for many cryptographic constructions

Hash functions

  • Hash functions
  • Encryption schemes
  • Message authentication codes
  • Keyed permutations
  • Popular Design Paradigms
  • Feistel Networks
  • Feistel Networks
  • Substitution-Permutation Networks

2

slide-3
SLIDE 3

Block Ciphers: Designs

  • Popular Design Paradigms

Feistel Network

  • Feistel Network
  • Eg: DES
  • Substitution-Permutation Network (SPN)
  • Eg: AES
slide-4
SLIDE 4
  • Popular Design Paradigms

Feistel Network

Block Ciphers: Designs

  • Feistel Network
  • Eg: DES
  • Long line of work analyzing provable security of Feistel [LR88, Pat03,

Pat04]

  • Security been studied in various security models [Pat10, HR10, HKT11,

Tes14, CHKPST16]

  • Substitution-Permutation Network (SPN)
  • Substitution-Permutation Network (SPN)
  • Eg: AES
  • In contrast, provable security of SPNs not as well-studied
slide-5
SLIDE 5

Related Work

slide-6
SLIDE 6

Related Work

slide-7
SLIDE 7

Substitution-Permutation Network (SPN)

slide-8
SLIDE 8

Substitution-Permutation Network (SPN)

. . .

slide-9
SLIDE 9

Substitution-Permutation Network (SPN)

. . .

slide-10
SLIDE 10

Substitution-Permutation Network (SPN)

slide-11
SLIDE 11

Substitution-Permutation Network (SPN)

. . .

slide-12
SLIDE 12

Substitution-Permutation Networks

Substitution- Permutation step

slide-13
SLIDE 13

Security of SPNs

slide-14
SLIDE 14

Security of SPNs

14

slide-15
SLIDE 15

Security of SPNs

15

slide-16
SLIDE 16

Security of SPNs

16

slide-17
SLIDE 17

Security of SPNs

  • Ideal World
  • Real World

17

slide-18
SLIDE 18

Categorizing SPNs

Linear function

slide-19
SLIDE 19

Categorizing SPNs

slide-20
SLIDE 20

Categorizing SPNs

Non-linear function

slide-21
SLIDE 21

Results: Linear SPNs

slide-22
SLIDE 22

Results: Non-linear SPNs

slide-23
SLIDE 23

Interpreting our Results

slide-24
SLIDE 24

Interpreting our Results

slide-25
SLIDE 25

Results

slide-26
SLIDE 26

Constructing Non-linear SPNs

slide-27
SLIDE 27

Constructing Non-linear SPNs: Blockwise Universal Permutations

slide-28
SLIDE 28

Constructing Non-linear SPNs: Blockwise Universal Permutations

slide-29
SLIDE 29

Constructing Non-linear SPNs: Blockwise Universal Permutations

slide-30
SLIDE 30

Non-linear SPNs via Blockwise Universal Permutations

. . .

slide-31
SLIDE 31

Non-linear SPNs via Blockwise Universal Permutations

. . .

slide-32
SLIDE 32

Non-linear SPNs via Blockwise Universal Permutations

slide-33
SLIDE 33

Results

slide-34
SLIDE 34

Security of 3-round linear SPN

slide-35
SLIDE 35

Security of 3-round Linear SPNs

slide-36
SLIDE 36

Results

slide-37
SLIDE 37

Takeaway

slide-38
SLIDE 38

Thank You

slide-39
SLIDE 39

Constructing Non-linear SPNs

slide-40
SLIDE 40

SPNs: Applications

1-round SPN

slide-41
SLIDE 41

Constructing Non-linear SPNs: Blockwise Universal Permutations