Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible
نویسندگان
چکیده
We argue that the invertibility of a block cipher can reduce the security of schemes that use it, and a better starting point for scheme design is the non-invertible analog of a block cipher, that is, a pseudorandom function (PRF). Since a block cipher may be viewed as a pseudorandom permutation, we are led to investigate the reverse of the problem studied by Luby and Rackoff, and ask: “how can one transform a PRP into a PRF in as security-preserving a way as possible?” The solution we propose is data-dependent re-keying. As an illustrative special case, let E : {0, 1}n×{0, 1}n → {0, 1}n be the block cipher. Then we can construct the PRF F from the PRP E by setting F (k, x) = E(E(k, x), x). We generalize this to allow for arbitrary block and key lengths, and to improve efficiency. We prove strong quantitative bounds on the value of data-dependent re-keying in the Shannon model of an ideal cipher, and take some initial steps towards an analysis in the standard model.
منابع مشابه
Luby-rackoo Backwards: Increasing Security by Making Block Ciphers Non-invertible Mihir Bellare
We argue that the invertibility of a block cipher can reduce the security of schemes that use it and a better starting point for scheme design is the non invertible analog of a block cipher that is a pseudorandom function PRF Since a block cipher may be viewed as a pseudorandom permutation we are led to investigate the reverse of the problem studied by Luby and Racko and ask how can one transfo...
متن کاملLuby-Racko Backwards: Increasing Security by Making Block Ciphers Non-Invertible
We argue that the invertibility of a block cipher can reduce the security of schemes that use it, and a better starting point for scheme design is the non-invertible analog of a block cipher, that is, a pseudorandom function (PRF). Since a block cipher may be viewed as a pseudorandom permutation, we are led to investigate the reverse of the problem studied by Luby and Racko , and ask: \how can ...
متن کاملTowards Making Luby-Rackoff Ciphers Optimal and Practical
We provide new constructions for Luby-Rackoo block ciphers which are eecient in terms of computations and key material used. Next, we show that we can make some security guarantees for Luby-Rackoo block ciphers under much weaker and more practical assumptions about the underlying function; namely, that the underlying function is a secure Message Authentication Code. Finally, we provide a SHA-1 ...
متن کاملLuby-Rackoff Ciphers from Weak Round Functions?
The Feistel-network is a popular structure underlying many block-ciphers where the cipher is constructed from many simpler rounds, each defined by some function which is derived from the secret key. Luby and Rackoff showed that the three-round Feistel-network – each round instantiated with a pseudorandom function secure against adaptive chosen plaintext attacks (CPA) – is a CPA secure pseudoran...
متن کاملOn the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of iterating simpler constructs for a number of rounds, and may provide insight into the security of such designs. We completely characterize the security of four-round Luby-Rackoff ciphers in our model, and show that t...
متن کامل