Revisiting Key-alternating Feistel Ciphers for Shorter Keys and - - PowerPoint PPT Presentation

revisiting key alternating feistel ciphers for shorter
SMART_READER_LITE
LIVE PREVIEW

Revisiting Key-alternating Feistel Ciphers for Shorter Keys and - - PowerPoint PPT Presentation

Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security Chun Guo and Lei Wang ICTEAM/ELEN/Crypto Group, Universit e catholique de Louvain Shanghai Jiao Tong University Presented by Yaobin Shen, Shanghai Jiao Tong


slide-1
SLIDE 1

Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security

Chun Guo and Lei Wang

ICTEAM/ELEN/Crypto Group, Universit´ e catholique de Louvain Shanghai Jiao Tong University

Presented by Yaobin Shen, Shanghai Jiao Tong University December 3 AISACRYPT 2018

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 1 / 36

slide-2
SLIDE 2

Outline

1

Feistel Cipher

2

Our Results

3

Key Issues in Security Proofs

4

Conclusion

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 2 / 36

slide-3
SLIDE 3

Block Ciphers

  • Usually iterative designs
  • Fall into two paradigms:

GKi ⊕ Pi ⊕ ⊕ Ki−1 Ki Feistel Cipher substitution-permutation networks (Even-Mansour Cipher)

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 3 / 36

slide-4
SLIDE 4

Feistel cipher v.s. Even-Mansour cipher

  • Consider constructing a cipher with 2n-bit blocks.
  • Feistel: underlying primitives have
  • smaller size, i.e., half block size; and
  • less construction properties, i.e. no need for invertibility

GKi ⊕ Pi ⊕ ⊕ Ki−1 Ki Feistel Cipher Even-Mansour Cipher

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 4 / 36

slide-5
SLIDE 5

Feistel cipher v.s. Even-Mansour cipher

  • Consider constructing a cipher with 2n-bit blocks.
  • Feistel: underlying primitives have
  • smaller size, i.e., half block size; and
  • less construction properties, i.e. no need for invertibility
  • Even-Mansour: larger primitives for higher provable (lower) bound.
  • O(n) rounds for 22n security.
  • In comparison, for Feistel security is at most 2n.

GKi ⊕ Pi ⊕ ⊕ Ki−1 Ki Feistel Cipher Even-Mansour Cipher

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 4 / 36

slide-6
SLIDE 6

Luby-Rackoff Feistel Cipher

  • Use a keyed PRF GK for the round function: (L, R) → (L ⊕ GK(R), L)
  • Long-term research since [Luby and Rackoff, 1988], consists of
  • provable security lower bound;
  • cryptanalytic: generic attacks;
  • bridge abstract model and dedicated ciphers,

e.g. practical key size, less round functions; L GK ⊕ R L′ R′

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 5 / 36

slide-7
SLIDE 7

Gap between Generic Feistel and Dedicated Cipher

  • (Recall) the general model: independent round-keys.
  • In reality: round-keys are derived from a short main-key, thus

correlated.

  • Using identical round-keys: 5 rounds [Pie91]
  • Using two independent round-keys: [NR99, PRG+99]
  • Besides, how to design the keyed PRF GK?

Li GKi ⊕ Ri Li+1 Ri+1

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 6 / 36

slide-8
SLIDE 8

Keyed Functions from Keyless Functions

  • Important and popular research direction: constructing the keyed

function from public keyless random functions Fi

  • This turns Luby-Rackoff into key-alternating Feistel [Lampe and

Seurin, FSE 2014] Li FKi ⊕ Ri Li+1 Ri+1 Li Fi ⊕ Ri ⊕ Ki Li+1 Ri+1 Luby-Rackoff Feistel = ⇒ Key-Alternating Feistel

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 7 / 36

slide-9
SLIDE 9

Key-Alternating Feistel: Provable Security

  • General case

using independent public round functions Fi independent round keys Ki.

  • t rounds has 2

rn r+1 security with r = ⌊t/6⌋ [Lampe and Seurin, FSE

2014] (asymptotically optimal) Security #rounds Reference 2n/2 6 [Lampe and Seurin] 22n/3 12 23n/4 18

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 8 / 36

slide-10
SLIDE 10

Key-Alternating Feistel: Generic Attacks

  • Known as Feistel-2 schemes in the cryptanalytic community [Isobe

and Shibutani, ASIACRYPT 2013] Attacks # Rounds Key size Complexity Reference Key-Recovery 6 2n 23n/2 [Guo et al, 8 3n 28n/3 ASIACRYPT 2014] 10 4n 211n/3

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 9 / 36

slide-11
SLIDE 11

Outline

1

Feistel Cipher

2

Our Results

3

Key Issues in Security Proofs

4

Conclusion

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 10 / 36

slide-12
SLIDE 12

In Short

We revisit the information-theoretic security of key-alternating Feistel in the ideal model.

  • We prove security for correlated round-keys.
  • We prove non-degradating multi-user security.

Li Fi ⊕ Ri ⊕ Ki Li+1 Ri+1

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 11 / 36

slide-13
SLIDE 13

Recapitulating Previous Result

  • Assume independent round-keys Ki

In reality: correlated round-keys.

  • Assume (mostly) independent public round functions Fi

In reality: identical round functions. Security #rounds Reference 2n/2 4 [Gentry and Ramzan, ASIACRYPT 2004] 2n/2 6 [Lampe and Seurin, FSE 2014] 22n/3 12 23n/4 18

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 12 / 36

slide-14
SLIDE 14

Our First Result for Birthday 2n/2 Security

  • Uses 4 rounds with single public

round function

  • Uses Suitable Round Key Vec-

tors − → K = (K1, K2, K3, K4):

  • K1 is uniformly distributed;
  • K4 is uniformly distributed;
  • K1 ⊕ K4 is uniformly dis-

tributed; F F F F ⊕ ⊕ ⊕ ⊕ ⊕ ⊕ ⊕ ⊕ K1 K2 K3 K4

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 13 / 36

slide-15
SLIDE 15

Our First Result for Birthday 2n/2 Security

  • Denote qe the number of cipher queries
  • Denote qf the number of function queries

Theorem

For the 4-round idealized Key-Alternating Feistel with a Single public round Function (SF) and a suitable round-key vector, in single-user (su) setting it holds Advsu

KAFSF(qf , qe) ≤ 9q2 e + 4qeqf

N . In the multi-user (mu) setting it holds Advmu

KAFSF(qf , qe) ≤ 50q2 e + 8qeqf

N .

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 14 / 36

slide-16
SLIDE 16

Minimalism

  • Derive round-keys from an n-bit main-key K
  • Key-schedule function π is a public and fixed orthomorphism of F n

2 ,

e.g., π(KLKR) = KL ⊕ KRKL F F F F ⊕ ⊕ ⊕ ⊕ ⊕ ⊕ K π

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 15 / 36

slide-17
SLIDE 17

Minimalism

No round-key in middle rounds.

  • But of course you can add any round-keys, they won’t reduce security.
  • On the other hand, the “unprotected” middle two rounds match

Ramzan and Reyzin (CRYPTO 2000), who showed that the middle two round functions of 4-round Luby-Rackoff scheme can be public. F F F F ⊕ ⊕ ⊕ ⊕ ⊕ ⊕ K π

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 16 / 36

slide-18
SLIDE 18

Our Second Result for Beyond-Birthday Security

  • We consider independent round functions for simplicity.
  • We prove 6 rounds have 2(2n−r)/3 security, when using Suitable

Round Key Vectors − → K = (K1, K2, K3, K4, K5, K6) such that

  • K1, K3, K5 are uniform in {0, 1}n, K2, K4, K6 are uniform in 2n−r

possibilities

  • for (i, j) ∈ {(1, 2), (2, 3), (4, 5), (5, 6), (1, 6)},

Ki and Kj are independent This means “adjacent” round-keys are independent. This is easily ensured by the common FSR-based key-schedules.

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 17 / 36

slide-19
SLIDE 19

Our Second Result for Beyond-Birthday Security

Theorem

For the 6-round idealized Key-Alternating Feistel with a suitable round-key vector, in single-user (su) setting it holds

Advsu

KAF(qf , qe) ≤ 7q3 e + 13qeq2 f + 22q2 eqf

N2 + 2r(8qeq2

f + 2q2 eqf )

N2 . In multi-user (mu) setting it holds Advmu

KAF(qf , qe) ≤ 1214q3 e + 26qeq2 f + 356q2 eqf

N2 + 2r(600q3

e + 16qeq2 f + 196q2 eqf )

N2 .

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 18 / 36

slide-20
SLIDE 20

The Simplest Example

Alternating two main-keys |K1| = n, |K2| = n − r.

F1 X Y Z k1 F2 k2 F3 k3 F4 k4 y1 x1 y2 y3 y4 x4 x2 x3 A S F5 k5 F6 k6 y5 y6 x6 x5

F1 K1 F2 F3 F4 y1 x1 y2 y3 y4 x4 x2 x3 F5 F6 y5 y6 x6 x5

K2

K1 K2

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 19 / 36

slide-21
SLIDE 21

Collapses to Partial-key Even-Mansour (PKEM)

This means the permutation in PKEM can be instantiated with a 6-round keyless Feistel for beyond-birthday security.

F1 X Y Z k1 F2 k2 F3 k3 F4 k4 y1 x1 y2 y3 y4 x4 x2 x3 A S F5 k5 F6 k6 y5 y6 x6 x5 F1 K1 F2 F3 F4 y1 x1 y2 y3 y4 x4 x2 x3 F5 F6 y5 y6 x6 x5 K2 K1 K2

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 20 / 36

slide-22
SLIDE 22

Application: Instantiating Keyed Sponges

Keyed sponges can be used for MACs and authenticated encryption.

π M[1] M[2] ... M[ℓ] π π r c K π π

trunc

z π K[1] ... K[w] r c L π M[1] M[2] ... M[ℓ] π π π π

trunc

z

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 21 / 36

slide-23
SLIDE 23

Application: Instantiating Keyed Sponges

Many (inner and outer) keyed sponges have their security reduce to the PKEM cipher. We show PKEM can be instantiated with the 6-round keyless Feistel Ψ6. So (inner and outer) keyed sponges can also be instantiated with the 6-round keyless Feistel Ψ6.

π M[1] M[2] π K K K M[3] π K K K ... ... PKEM Ψ6 M[1] M[2] K K K M[3] K K K ... ... Ψ6 Ψ6

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 22 / 36

slide-24
SLIDE 24

Another Application: A Key-schedule Proposal

By the derived conditions on 6 rounds, we propose a concrete key-schedule motivated by the complexity community [Luby and Wigderson, 2005]: k1 = K1 + 2 ⊗ K2, k2 =2 ⊗ K1 + 3 ⊗ K2, k3 = 3 ⊗ K1 + 5 ⊗ K2, k4 =5 ⊗ K1 + 7 ⊗ K2, . . . , kt =at ⊗ K1 + at+1 ⊗ K2, where:

  • 2n-bit main-key K = K1K2
  • a ⊗ b is the multiplication of two field elements a, b ∈ Fn

2

  • for 1 ≤ t ≪ 2n, let the constants at and at+1 be the t and (t + 1)th

values in the prime sequence 1, 2, 3, 5, 7, 11, 13, . . . resp. The complicated sequence of constants eliminate obvious weak keys, see the full version of this paper.

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 23 / 36

slide-25
SLIDE 25

A Comparison with Previous KAF Results

Security #Rounds #Indepedent Minimum Reference Functions key Size 2n/2 4 2 4n [Gentry and Ramzan] 4 1 n Ours 22n/3 12 12 12n [Lampe and Seurin] 6 6 2n Ours

  • For birthday security we improve upon Gentry and Ramzan.
  • For beyond-birthday security we improve upon Lampe and Seurin.
  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 24 / 36

slide-26
SLIDE 26

Remark on a Recent Result

  • Gilboa, Gueron, and Nandi (2016) proved the 2-round Even-Mansour

with 2n-bit keys and 2-round keyless Feistel ΨP

2 (P a random

permutation) as the round permutations is secure up to 2n/2 queries.

  • This transits into a KAF variant with whitening keys, which may be

quite different and incomparable to KAF without whitening keys, the focus of the presented work (see https://arxiv.org/abs/1810.07428).

k1 k2 P k1 P P P k2 k1 k2 k1 k2 P P P P k1 k2

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 25 / 36

slide-27
SLIDE 27

Outline

1

Feistel Cipher

2

Our Results

3

Key Issues in Security Proofs

4

Conclusion

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 26 / 36

slide-28
SLIDE 28

Security Definition

real world KAF F1, . . . , Ft D 0/1 ideal world RP F1, . . . , Ft D 0/1

  • real world: KAF with random master key
  • ideal world: random permutation (RP)
  • D has access to F1, F2, . . . , Ft in both worlds
  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 27 / 36

slide-29
SLIDE 29

Security Definition

  • the Fi’s are modeled as public random functions

(adversary can only make black-box queries)

  • adversary cannot exploit any weakness of round functions

(generic attacks)

  • complexity measure of the adversary

− qe: #construction queries (Data); − qf : #function queries to each function (Time) − computationally unbounded

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 28 / 36

slide-30
SLIDE 30

Security Definition

real world KAF F1, . . . , Ft D 0/1 ideal world RP F1, . . . , Ft D 0/1

  • advantage of D is defined as

Adv(D) = Pr

  • Dreal ⇒ 1
  • − Pr
  • Dideal ⇒ 1
  • security is defined via upper bounding Adv(D):

Adv(qe, qf ) = max

D Adv(D)

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 29 / 36

slide-31
SLIDE 31

Proof Framework

  • H-coefficients Techniques [Pat09]
  • transcript of distinguisher τ = (QE, QF1, . . . , QFt):
  • QE: qe query-responses of cipher;
  • QFi: qf query-responses of function Fi;
  • Prre[τ]: the probability of D receiving τ in real world;
  • Prid[τ]: the probability of D receiving τ in ideal world;

Theorem

Let ε(qf , qe) > 0. Assume that for any transcript τ with Prid[τ] > 0, we have Prre(τ) ≥ (1 − ε(qf , qe))Prid(τ), then it holds Adv(qf , qe) ≤ ε(qf , qe).

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 30 / 36

slide-32
SLIDE 32

Proof Sketch

  • peel off the first and the last rounds
  • internal states are ”random” and just ”known” to adversary

L (C-1) R T S X Y A X’ Z L (C-2) R T S X Y A Z L (C-3) R T S X Y A Z L (C-4) R T S X A L’ R’ S’ T’ A’ L (C-5) R T S X A L’ R’ S’ T’

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 31 / 36

slide-33
SLIDE 33

Outline

1

Feistel Cipher

2

Our Results

3

Key Issues in Security Proofs

4

Conclusion

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 32 / 36

slide-34
SLIDE 34

Conclusion

  • information-theoretic security of Key-Alternating Feistel
  • towards minimizing sufficient conditions to guarantee certain bound
  • define suitable round key vectors
  • 2n/2 bound: 4 rounds with single function
  • 22n/3 bound: 6 rounds
  • in both single-user and multi-user settings
  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 33 / 36

slide-35
SLIDE 35

Conclusion

  • information-theoretic security of Key-Alternating Feistel
  • towards minimizing sufficient conditions to guarantee certain bound
  • define suitable round key vectors
  • 2n/2 bound: 4 rounds with single function
  • 22n/3 bound: 6 rounds
  • in both single-user and multi-user settings

Open Problem

  • prove 6-round KAF with less public functions
  • improve security bound of 6-round KAF
  • improve security bound for t-round KAF with generic t
  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 33 / 36

slide-36
SLIDE 36

Thanks for your attention!

  • C. Guo, L. Wang (SJTU)

Revisiting KAF December 3, 2018 34 / 36