On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
نویسندگان
چکیده
Feistel constructions have been shown to be indifferentiable from random permutations at STOC 2011. Whereas how to properly mix the keys into an un-keyed Feistel construction without appealing to domain separation technique to obtain a block cipher which is provably secure against known-key and chosen-key attacks (or to obtain an ideal cipher) remains an open problem. We study this, particularly the basic structure of NSA’s SIMON family of block ciphers. SIMON family takes a construction which has the subkey xored into a halve of the state at each round. More clearly, at the i-th round, the state is updated according to (xi, xi−1) 7→ (xi−1 ⊕ Fi(xi)⊕ ki, xi) For such key-alternating Feistel ciphers, we show that 21 rounds are sufficient to achieve indifferentiability from ideal ciphers with 2n-bit blocks and n-bit keys, assuming the n-to-n-bit round functions F1, . . . , F21 to be random and public and an identical user-provided n-bit key to be applied at each round. This gives an answer to the question mentioned before, which is the first to our knowledge.
منابع مشابه
Towards Understanding the Known-Key Security of Block Ciphers
Known-key distinguishers for block ciphers were proposed by Knudsen and Rijmen at ASIACRYPT 2007 and have been a major research topic in cryptanalysis since then. A formalization of known-key attacks in general is known to be difficult. In this paper, we tackle this problem for the case of block ciphers based on ideal components such as random permutations and random functions as well as propos...
متن کاملOn the Indifferentiability of Key-Alternating Ciphers
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structure of AES can be viewed as a (10-round) key-alternating cipher, where a t-round key-alternating cipher KAt consists of a small number t of fixed permutations Pi on n bits, separated by key addition: KAt(K,m) = kt ⊕ Pt(. . . k2 ⊕ P2(k1 ⊕ P1(k0 ⊕m)) . . . ), where (k0, . . . , kt) are obtained from ...
متن کاملSecurity Analysis of Key-Alternating Feistel Ciphers
We study the security of key-alternating Feistel ciphers, a class of key-alternating ciphers with a Feistel structure. Alternatively, this may be viewed as the study of Feistel ciphers where the pseudorandom round functions are of the form Fi(x⊕ ki), where ki is the (secret) round key and Fi is a public random function that the adversary is allowed to query in a black-box way. Interestingly, ou...
متن کاملImproving the Round Complexity of Ideal-Cipher Constructions
Title of dissertation: IMPROVING THE ROUND COMPLEXITY OF IDEAL-CIPHER CONSTRUCTIONS Aishwarya Thiruvengadam, Doctor of Philosophy, 2017 Dissertation directed by: Professor Jonathan Katz Department of Computer Science Block ciphers are an essential ingredient of modern cryptography. They are widely used as building blocks in many cryptographic constructions such as encryption schemes, hash funct...
متن کاملIndifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation
We revisit the t-round Even-Mansour (EM) scheme with random oracle key derivation previously considered by Andreeva et al. (CRYPTO 2013), namely, xork ◦Pt ◦ xork ◦ . . . ◦ xork ◦P2 ◦ xork ◦P1 ◦ xork, where P1, . . . ,Pt stand for t independent n-bit random permutations, xork is the operation of xoring with the n-bit round-key k = H(K) for a κ-to-n-bit bit random oracle H on a κ-bit main key K. ...
متن کامل