Paper 2017/873
Cycle Slicer: An Algorithm for Building Permutations on Special Domains
Sarah Miracle and Scott Yilek
Abstract
We introduce an algorithm called Cycle Slicer that gives new solutions to two important problems in format-preserving encryption: domain targeting and domain completion. In domain targeting, where we wish to use a cipher on domain $\mathcal{X}$ to construct a cipher on a smaller domain $\mathcal{S} \subseteq \mathcal{X}$, using Cycle Slicer leads to a significantly more efficient solution than Miracle and Yilek's Reverse Cycle Walking (ASIACRYPT 2016) in the common setting where the size of $\mathcal{S}$ is large relative to the size of $\mathcal{X}$. In domain completion, a problem recently studied by Grubbs, Ristenpart, and Yarom (EUROCRYPT 2017) in which we wish to construct a cipher on domain $\mathcal{X}$ while staying consistent with existing mappings in a lazily-sampled table, Cycle Slicer provides an alternative construction with better worst-case running time than the Zig-Zag construction of Grubbs et al. Our analysis of Cycle Slicer uses a refinement of the Markov chain techniques for analyzing matching exchange processes, which were originally developed by Czumaj and Kutylowski (Rand. Struct. \& Alg. 2000).
Metadata
- Available format(s)
- Publication info
- Published by the IACR in ASIACRYPT 2017
- Keywords
- format-preserving encryptionsmall-domain block ciphersMarkov chainsmatchings
- Contact author(s)
- syilek @ stthomas edu
- History
- 2017-09-13: received
- Short URL
- https://ia.cr/2017/873
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/873, author = {Sarah Miracle and Scott Yilek}, title = {Cycle Slicer: An Algorithm for Building Permutations on Special Domains}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/873}, year = {2017}, url = {https://eprint.iacr.org/2017/873} }