You are looking at a specific version 20181129:023141 of this paper. See the latest version.

Paper 2018/1130

Applications of H-Technique: Revisiting Symmetric Key Security Analysis

Ashwin Jha and Mridul Nandi

Abstract

The Coefficients H Technique (also called H-technique), by Patarin, is a tool to obtain upper bound on the distinguishing advantage. The tool is known for providing quite simpler and tight bound proofs as compared to some other well-known tools such as Game-playing technique and Random Systems methodology. In this paper, we aim to provide a brief survey on the H-technique. The survey is in three parts: First, we redevelop the necessary nomenclatures and tools required to study the security of symmetric key designs. Second, we give a full description of the H-technique and show that it can provide optimal bounds on the distinguishing advantage. Third, we give simpler proofs for some popular symmetric key designs, across different paradigms, using the H-technique.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
provable securitycoefficients H techniqueFeistelENRLDTHCTRTET
Contact author(s)
ashwin jha1991 @ gmail com
History
2022-09-03: last of 3 revisions
2018-11-29: received
See all versions
Short URL
https://ia.cr/2018/1130
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.