Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited
نویسندگان
چکیده
We construct non-malleable codes in the split-state model with codeword length m + 3λ or 5λ, where is message size and λ security parameter, depending on how conservative one is. Our scheme very simple involves a single call to block cipher meeting new notion which we dub entropic fixed-related-key security, essentially means that behaves like pseudorandom permutation when queried upon inputs sampled from distribution sufficient min-entropy, even under related-key attacks respect an arbitrary but fixed key relation. Importantly, indistinguishability only holds original secret (and not tampered key).In previous work, Fehr, Karpman, Mennink (ToSC 2018) used related assumption (where can be chosen by adversary, key) nonmalleable code 2λ. Unfortunately, no (even ideal one) satisfies their tampering function allowed cipher-dependent. In contrast, are able show large class of cipher-dependent (including those break Mennink).
منابع مشابه
Block-Wise Non-Malleable Codes
Non-malleable codes, introduced by Dziembowski, Pietrzak, and Wichs (ICS ’10) provide the guarantee that if a codeword c of a message m, is modified by a tampering function f to c′, then c′ either decodes to m or to “something unrelated” to m. It is known that non-malleable codes cannot exist for the class of all tampering functions and hence a lot of work has focused on explicitly constructing...
متن کاملCiphers Secure against Related-Key Attacks
In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the security of PRFand PRP-constructions against related-key attacks. For adversaries who can only transform a part of the key, we propose a construction and prove its security, assuming a conventionally secure block cipher is given. B...
متن کاملConstructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
Almost all current block-cipher-based MACs reduce their security to the pseudorandomness of their underlying block ciphers, except for a few of them to the unpredictability, a strictly weaker security notion than pseudorandomness. However, the latter MACs offer relatively low efficiency. In this paper, we investigate the feasibility of constructing rate-1 MACs from related-key unpredictable blo...
متن کاملMessage Authentication Codes from Unpredictable Block Ciphers
We design an efficient mode of operation on block ciphers, SS-NMAC. Our mode has the following properties, when instantiated with a block cipher f to yield a variable-length, keyed hash function H: (1) MAC Preservation. H is a secure message authentication code (MAC) with birthday security, as long as f is unpredictable. (2) PRF Preservation. H is a secure pseudorandom function (PRF) with birth...
متن کاملOptimally Secure Block Ciphers from Ideal Primitives
Recent advances in block-cipher theory deliver security analyses in models where one or more underlying components (e.g., a function or a permutation) are ideal (i.e., randomly chosen). This paper addresses the question of finding new constructions achieving the highest possible security level under minimal assumptions in such ideal models. We present a new block-cipher construction, derived fr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transaction on symmetric cryptology
سال: 2022
ISSN: ['2519-173X']
DOI: https://doi.org/10.46586/tosc.v2022.i3.1-19