On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers

  • Ermaliza Razali
  • Raphael C. -W. Phan
  • Marc Joye
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4784)

Abstract

Security of commonly used block ciphers is typically measured in terms of their resistance to known attacks. While the provable security approach to block ciphers dates back to the first CRYPTO conference (1981), analysis of modern block cipher proposals basically do not benefit fully from this, except for a few cases. This paper considers the security of recently proposed PRP-RKA secure block ciphers and discusses how they relate to existing types of attacks on block ciphers.

Keywords

Provable security pseudorandom permutation (PRPkey recovery (KRblock cipher related key attacks (RKA

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bellare, M., Kohno, T.A.: Theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 491–506. Springer, Heidelberg (2003), available at http://www-cse.ucsd.edu/users/mihir/papers/rka.html CrossRefGoogle Scholar
  2. 2.
    Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61(3), 362–399 (2000)MATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Biryukov, A., Wagner, D.: Advanced slide attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589–606. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Choi, J., Kim, J., Sung, J., Lee, S., Lim, J.: Related-key and meet-in-the-middle attacks on Triple-DES and DES-EXE. In: Gervasi, O., Gavrilova, M., Kumar, V., Laganà, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 567–576. Springer, Heidelberg (2005)Google Scholar
  5. 5.
    Hellman, M.E., Karnin, E.D., Reyneri, J.M.: On the necessity of exhaustive search for system-invariant cryptanalysis. In: Advances in Cryptology − A Report on CRYPTO 1981, U.C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, pp. 2–6 (1982)Google Scholar
  6. 6.
    Kelsey, J., Schneier, B., Wagner, D.: Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237–251. Springer, Heidelberg (1996)Google Scholar
  7. 7.
    Kelsey, J., Schneier, B., Wagner, D.: Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 233–246. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  8. 8.
    Kilian, J., Rogaway, P.: How to protect DES against exhaustive key search (an analysis of DESX). J. Cryptology 14(1), 17–35 (2001)MATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Kim, J., Sung, J., Lee, S., Preneel, B.: Pseudorandom permutation and function families secure against related-key attacks. Unpublished manuscriptGoogle Scholar
  10. 10.
    Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31–46. Springer, Heidelberg (2002)Google Scholar
  11. 11.
    Lucks, S.: Ciphers secure against related-key attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 359–370. Springer, Heidelberg (2004)Google Scholar
  12. 12.
    Phan, D.H., Pointcheval, D.: About the security of ciphers (semantic security and pseudo-random permutations). In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 182–197. Springer, Heidelberg (2004)Google Scholar
  13. 13.
    Phan, R.C.-W.: Related-key attacks on triple-DES and DESX variants. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 15–24. Springer, Heidelberg (2004)Google Scholar
  14. 14.
    Razali, E., Phan, R.C.-W.: On the existence of related-key oracles in cryptosystems based on block ciphers. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 425–438. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  15. 15.
    Winternitz, R.S., Hellman, M.E.: Chosen-key attacks on a block cipher. Cryptologia 11(1), 16–20 (1987)MATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ermaliza Razali
    • 1
  • Raphael C. -W. Phan
    • 2
  • Marc Joye
    • 3
  1. 1.Information Security Research (iSECURES) Lab, Swinburne University of Technology, Sarawak campus, KuchingMalaysia
  2. 2.Laboratoire de sécurité et de cryptographie, EPFL, Station 14 - Building INF, 1015 LausanneSwitzerland
  3. 3.Thomson R&D France, Technology Group, Corporate Research, Security Laboratory, 1 avenue de Belle Fontaine, 35576 Cesson-Sévigné CedexFrance

Personalised recommendations