tweaking even mansour ciphers
play

Tweaking Even-Mansour Ciphers Benot Cogliati 1 Rodolphe Lampe 1 - PowerPoint PPT Presentation

Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Tweaking Even-Mansour Ciphers Benot Cogliati 1 Rodolphe Lampe 1 Yannick Seurin 2 1 Versailles University, France 2 ANSSI, France August 17, 2015 CRYPTO


  1. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Tweaking Even-Mansour Ciphers Benoît Cogliati 1 Rodolphe Lampe 1 Yannick Seurin 2 1 Versailles University, France 2 ANSSI, France August 17, 2015 — CRYPTO 2015 Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 1 / 26

  2. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Outline Background: Tweakable Block Ciphers Our Contribution Overview of the Proof for Two Rounds Longer Cascades Conclusion and Perspectives Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 2 / 26

  3. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Tweakable Block Ciphers (TBCs) k y x � E • tweak t : brings variability to the block cipher • t assumed public or even adversarially controlled • each tweak should give an “independent” permutation • few “natively tweakable” BCs: • Hasty Pudding Cipher [Sch98] • Mercy [Cro00] • Threefish [FLS + 10] • CAESAR proposals KIASU, Deoxys, Joltik, (i)SCREAM, Minalpher Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 3 / 26

  4. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Tweakable Block Ciphers (TBCs) k y x � E t • tweak t : brings variability to the block cipher • t assumed public or even adversarially controlled • each tweak should give an “independent” permutation • few “natively tweakable” BCs: • Hasty Pudding Cipher [Sch98] • Mercy [Cro00] • Threefish [FLS + 10] • CAESAR proposals KIASU, Deoxys, Joltik, (i)SCREAM, Minalpher Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 3 / 26

  5. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Tweakable Block Ciphers (TBCs) k y x � E t • tweak t : brings variability to the block cipher • t assumed public or even adversarially controlled • each tweak should give an “independent” permutation • few “natively tweakable” BCs: • Hasty Pudding Cipher [Sch98] • Mercy [Cro00] • Threefish [FLS + 10] • CAESAR proposals KIASU, Deoxys, Joltik, (i)SCREAM, Minalpher Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 3 / 26

  6. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Tweakable Block Ciphers (TBCs) k y x � E t • tweak t : brings variability to the block cipher • t assumed public or even adversarially controlled • each tweak should give an “independent” permutation • few “natively tweakable” BCs: • Hasty Pudding Cipher [Sch98] • Mercy [Cro00] • Threefish [FLS + 10] • CAESAR proposals KIASU, Deoxys, Joltik, (i)SCREAM, Minalpher Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 3 / 26

  7. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Tweakable Block Ciphers (TBCs) k y x � E t • tweak t : brings variability to the block cipher • t assumed public or even adversarially controlled • each tweak should give an “independent” permutation • few “natively tweakable” BCs: • Hasty Pudding Cipher [Sch98] • Mercy [Cro00] • Threefish [FLS + 10] • CAESAR proposals KIASU, Deoxys, Joltik, (i)SCREAM, Minalpher Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 3 / 26

  8. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Generic Constructions of TBCs • A generic TBC construction turns a conventional block cipher E into a TBC � E • example: LRW construction by Liskov et al. [LRW02] k y x E • h is XOR-universal, e.g. h k ′ ( t ) = k ′ ⊗ t (field mult.) • secure up to ∼ 2 n / 2 queries • related construction XEX [Rog04] uses E k ( t ) instead of h k ′ ( t ) (used e.g. in the XTS disk encryption mode) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 4 / 26

  9. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Generic Constructions of TBCs • A generic TBC construction turns a conventional block cipher E into a TBC � E • example: LRW construction by Liskov et al. [LRW02] k y x E • h is XOR-universal, e.g. h k ′ ( t ) = k ′ ⊗ t (field mult.) • secure up to ∼ 2 n / 2 queries • related construction XEX [Rog04] uses E k ( t ) instead of h k ′ ( t ) (used e.g. in the XTS disk encryption mode) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 4 / 26

  10. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Generic Constructions of TBCs • A generic TBC construction turns a conventional block cipher E into a TBC � E • example: LRW construction by Liskov et al. [LRW02] h k ′ ( t ) h k ′ ( t ) k y x E • h is XOR-universal, e.g. h k ′ ( t ) = k ′ ⊗ t (field mult.) • secure up to ∼ 2 n / 2 queries • related construction XEX [Rog04] uses E k ( t ) instead of h k ′ ( t ) (used e.g. in the XTS disk encryption mode) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 4 / 26

  11. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Generic Constructions of TBCs • A generic TBC construction turns a conventional block cipher E into a TBC � E • example: LRW construction by Liskov et al. [LRW02] h k ′ ( t ) h k ′ ( t ) k y x E • h is XOR-universal, e.g. h k ′ ( t ) = k ′ ⊗ t (field mult.) • secure up to ∼ 2 n / 2 queries • related construction XEX [Rog04] uses E k ( t ) instead of h k ′ ( t ) (used e.g. in the XTS disk encryption mode) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 4 / 26

  12. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Generic Constructions of TBCs • A generic TBC construction turns a conventional block cipher E into a TBC � E • example: LRW construction by Liskov et al. [LRW02] h k ′ ( t ) h k ′ ( t ) k y x E • h is XOR-universal, e.g. h k ′ ( t ) = k ′ ⊗ t (field mult.) • secure up to ∼ 2 n / 2 queries • related construction XEX [Rog04] uses E k ( t ) instead of h k ′ ( t ) (used e.g. in the XTS disk encryption mode) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 4 / 26

  13. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Cascading the LRW Construction k ′ 1 ⊗ t k ′ 2 ⊗ t k ′ r ⊗ t y x E k 1 E k 2 E k r • k 1 , . . . , k r and k ′ 1 , . . . , k ′ r independent keys ⇒ total key-length = r ( κ + n ) • 2 rounds: provably secure up to ∼ 2 2 n / 3 queries [LST12] rn r + 2 queries [LS13] • r rounds, r even: provably secure up to ∼ 2 • NB: only assuming E is a PRP (standard security notion, no ideal model) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 5 / 26

  14. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Cascading the LRW Construction k ′ 1 ⊗ t k ′ 2 ⊗ t k ′ r ⊗ t y x E k 1 E k 2 E k r • k 1 , . . . , k r and k ′ 1 , . . . , k ′ r independent keys ⇒ total key-length = r ( κ + n ) • 2 rounds: provably secure up to ∼ 2 2 n / 3 queries [LST12] rn r + 2 queries [LS13] • r rounds, r even: provably secure up to ∼ 2 • NB: only assuming E is a PRP (standard security notion, no ideal model) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 5 / 26

  15. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Cascading the LRW Construction k ′ 1 ⊗ t k ′ 2 ⊗ t k ′ r ⊗ t y x E k 1 E k 2 E k r • k 1 , . . . , k r and k ′ 1 , . . . , k ′ r independent keys ⇒ total key-length = r ( κ + n ) • 2 rounds: provably secure up to ∼ 2 2 n / 3 queries [LST12] rn r + 2 queries [LS13] • r rounds, r even: provably secure up to ∼ 2 • NB: only assuming E is a PRP (standard security notion, no ideal model) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 5 / 26

  16. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Cascading the LRW Construction k ′ 1 ⊗ t k ′ 2 ⊗ t k ′ r ⊗ t y x E k 1 E k 2 E k r • k 1 , . . . , k r and k ′ 1 , . . . , k ′ r independent keys ⇒ total key-length = r ( κ + n ) • 2 rounds: provably secure up to ∼ 2 2 n / 3 queries [LST12] rn r + 2 queries [LS13] • r rounds, r even: provably secure up to ∼ 2 • NB: only assuming E is a PRP (standard security notion, no ideal model) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 5 / 26

  17. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Outline Background: Tweakable Block Ciphers Our Contribution Overview of the Proof for Two Rounds Longer Cascades Conclusion and Perspectives Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 6 / 26

  18. Tweakable Block Ciphers Our Contribution Proof Overview Longer Cascades Conclusion Tweakable Even-Mansour Constructions Our Goal Provide provable security guidelines to design TBCs “from scratch” (rather than from an existing conventional block cipher). • “from scratch” → from some lower level primitive • from a PRF: Feistel schemes [GHL + 07, MI08] • this work: SPN ciphers (more gen. key-alternating ciphers) k f 0 f 1 f r y x P 1 P 2 P r • analysis in the Random Permutation Model ⇒ “tweakable” Even-Mansour construction(s) Cogliati, Lampe, Seurin Tweaking Even-Mansour Ciphers CRYPTO 2015 7 / 26

Recommend


More recommend