Volume 8424 of the series Lecture Notes in Computer Science pp 133-151
Tweakable Blockciphers with Asymptotically Optimal Security
- Rodolphe LampeAffiliated withUniversity of Versailles
- , Yannick SeurinAffiliated withANSSI Email author
Abstract
We consider tweakable blockciphers with beyond the birthday bound security. Landecker, Shrimpton, and Terashima (CRYPTO 2012) gave the first construction with security up to \(\mathcal {O}(2^{2n/3})\) adversarial queries (\(n\) denotes the block size in bits of the underlying blockcipher), and for which changing the tweak does not require changing the keys for blockcipher calls. In this paper, we extend this construction, which consists of two rounds of a previous proposal by Liskov, Rivest, and Wagner (CRYPTO 2002), by considering larger numbers of rounds \(r>2\). We show that asymptotically, as \(r\) increases, the resulting tweakable blockcipher approaches security up to the information bound, namely \(\mathcal {O}(2^n)\) queries. Our analysis makes use of a coupling argument, and carries some similarities with the analysis of the iterated Even-Mansour cipher by Lampe, Patarin, and Seurin (ASIACRYPT 2012).
Keywords
Tweakable blockcipher Beyond birthday bound Coupling Message authentication code- Title
- Tweakable Blockciphers with Asymptotically Optimal Security
- Book Title
- Fast Software Encryption
- Book Subtitle
- 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers
- Pages
- pp 133-151
- Copyright
- 2014
- DOI
- 10.1007/978-3-662-43933-3_8
- Print ISBN
- 978-3-662-43932-6
- Online ISBN
- 978-3-662-43933-3
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 8424
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Keywords
-
- Tweakable blockcipher
- Beyond birthday bound
- Coupling
- Message authentication code
- Industry Sectors
- eBook Packages
- Editors
-
-
Shiho Moriai
(15)
-
Shiho Moriai
- Editor Affiliations
-
- 15. Network Security Research Institute, National Institute of Information and Communications Technology (NICT)
- Authors
-
-
Rodolphe Lampe
(16)
-
Yannick Seurin
(17)
-
Rodolphe Lampe
- Author Affiliations
-
- 16. University of Versailles, Versailles, France
- 17. ANSSI, Paris, France
Continue reading...
To view the rest of this content please follow the download PDF link above.