eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2015/397

Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes

Peter Gazi, Jooyoung Lee, Yannick Seurin, John Steinberger, and Stefano Tessaro

Abstract

We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Previous works typically considered the extreme case where the adversary is given the entire codebook of the construction, the only complexity measure being the number $q_e$ of queries to the underlying ideal block cipher, representing adversary's secret-key-independent computation. Here, we initiate a systematic study of the more natural case of an adversary restricted to adaptively learning a number $q_c$ of plaintext/ciphertext pairs that is less than the entire codebook. For any such $q_c$, we aim to determine the highest number of block-cipher queries $q_e$ the adversary can issue without being able to successfully distinguish the construction (under a secret key) from a random permutation. More concretely, we show the following results for key-length extension schemes using a block cipher with $n$-bit blocks and $\kappa$-bit keys: - Plain cascades of length $\ell = 2r+1$ are secure whenever $q_c q_e^r \ll 2^{r(\kappa+n)}$, $q_c \ll 2^\ka$ and $q_e \ll 2^{2\ka}$. The bound for $r = 1$ also applies to two-key triple encryption (as used within Triple DES). - The $r$-round XOR-cascade is secure as long as $q_c q_e^r \ll 2^{r(\kappa+n)}$, matching an attack by Gazi (CRYPTO 2013). - We fully characterize the security of Gazi and Tessaro's two-call 2XOR construction (EUROCRYPT 2012) for all values of $q_c$, and note that the addition of a third whitening step strictly increases security for $2^{n/4} \le q_c \le 2^{3/4n}$. We also propose a variant of this construction without re-keying and achieving comparable security levels.

Note: An abridged version appears in the proceedings of FSE 2015. This is the full version.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
A major revision of an IACR publication in FSE 2015
Keywords
block cipherskey-length extensionprovable securityideal-cipher model
Contact author(s)
yannick seurin @ m4x org
History
2015-05-01: received
Short URL
https://ia.cr/2015/397
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/397,
      author = {Peter Gazi and Jooyoung Lee and Yannick Seurin and John Steinberger and Stefano Tessaro},
      title = {Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes},
      howpublished = {Cryptology ePrint Archive, Paper 2015/397},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/397}},
      url = {https://eprint.iacr.org/2015/397}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.