An asymptotically tight security analysis of the iterated Even-Mansour cipher

55Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We analyze the security of the iterated Even-Mansour cipher (a.k.a. key-alternating cipher), a very simple and natural construction of a blockcipher in the random permutation model. This construction, first considered by Even and Mansour (J. Cryptology, 1997) with a single permutation, was recently generalized to use t permutations in the work of Bogdanov et al. (EUROCRYPT 2012). They proved that the construction is secure up to O(N2/3) queries (where N is the domain size of the permutations), as soon as the number t of rounds is 2 or more. This is tight for t = 2, however in the general case the best known attack requires Ω(Nt/(t+1)) queries. In this paper, we give asymptotically tight security proofs for two types of adversaries: 1. for non-adaptive chosen-plaintext adversaries, we prove that the construction achieves an optimal security bound of O(Nt/(t+1)) queries; 2. for adaptive chosen-plaintext and ciphertext adversaries, we prove that the construction achieves security up to O(Nt/(t+2)) queries (for t even). This improves previous results for t ≥ 6. Our proof crucially relies on the use of a coupling to upper-bound the statistical distance of the outputs of the iterated Even-Mansour cipher to the uniform distribution. © International Association for Cryptologic Research 2012.

Cite

CITATION STYLE

APA

Lampe, R., Patarin, J., & Seurin, Y. (2012). An asymptotically tight security analysis of the iterated Even-Mansour cipher. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7658 LNCS, pp. 278–295). https://doi.org/10.1007/978-3-642-34961-4_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free