Luby-Racko Backwards: Increasing Security by Making Block Ciphers Non-Invertible

نویسندگان

  • Mihir Bellare
  • Ted Krovetz
چکیده

We argue that the invertibility of a block cipher can reduce the security of schemes that use it, and a better starting point for scheme design is the non-invertible analog of a block cipher, that is, a pseudorandom function (PRF). Since a block cipher may be viewed as a pseudorandom permutation, we are led to investigate the reverse of the problem studied by Luby and Racko , and ask: \how can one transform a PRP into a PRF in as security-preserving a way as possible?" The solution we propose is data-dependent re-keying. As an illustrative special case, let E : f0; 1g f0; 1g ! f0; 1g be the block cipher. Then we can construct the PRF F from the PRP E by setting F (k; x) = E(E(k; x); x). We generalize this to allow for arbitrary block and key lengths, and to improve e ciency. We prove strong quantitative bounds on the value of data-dependent re-keying in the Shannon model of an ideal cipher, and take some initial steps towards an analysis in the standard model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Luby-rackoo Backwards: Increasing Security by Making Block Ciphers Non-invertible Mihir Bellare

We argue that the invertibility of a block cipher can reduce the security of schemes that use it and a better starting point for scheme design is the non invertible analog of a block cipher that is a pseudorandom function PRF Since a block cipher may be viewed as a pseudorandom permutation we are led to investigate the reverse of the problem studied by Luby and Racko and ask how can one transfo...

متن کامل

Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible

We argue that the invertibility of a block cipher can reduce the security of schemes that use it, and a better starting point for scheme design is the non-invertible analog of a block cipher, that is, a pseudorandom function (PRF). Since a block cipher may be viewed as a pseudorandom permutation, we are led to investigate the reverse of the problem studied by Luby and Rackoff, and ask: “how can...

متن کامل

On the semantic security of cellular automata based pseudo-random permutations using results from the Luby-Racko construction

This paper proposes a semantically secure construction of pseudo-random permutations using second-order reversible cellular automata. We show that the proposed construction is equivalent to the LubyRacko model if it is built using non-uniform transition rules, and we prove that the construction is strongly secure if an adequate number of iterations is performed. Moreover, a corresponding symmet...

متن کامل

Faster Luby-Racko Ciphers

This paper deals with a generalization of Luby's and Rack-oo's results 9] on the construction of block ciphers and their consequences for block cipher implementations. Based on dedicated hash functions , block ciphers are proposed which are more eecient and operate on larger blocks than their original Luby-Rackoo counterparts.

متن کامل

Fast Encryption for Set{Top Technologies

In this paper we present two approaches to combine recent results of cryptographic research with the requirements of modern multimedia systems. The rst is to evaluate modern block ciphers in a JAVA{environment. The second approach is based on recent developments regarding fast Luby{Racko ciphers. Paradoxically, it deals with doing \high-bandwidth encryption with low-bandwidth smartcards". Also,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998