HCTR was proposed by Wang, Feng and Wu in 2005. It is a mode of operation which provides a tweakable strong pseudorandom permutation. Though HCTR is quite an efficient mode, the authors showed a cubic security bound for HCTR which makes it unsuitable for applications where tweakable strong pseudorandom permutations are required. In this paper we show that HCTR has a better security bound than what the authors showed. We prove that the distinguishing advantage of an adversary in distinguishing HCTR and its inverse from a random permutation and its inverse is bounded above by 4.5 σ 2/2 n , where n is the block-length of the block-cipher and σ is the number of n-block queries made by the adversary (including the tweak). © 2008 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Chakraborty, D., & Nandi, M. (2008). An improved security bound for HCTR. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5086 LNCS, pp. 289–302). https://doi.org/10.1007/978-3-540-71039-4_18
Mendeley helps you to discover research relevant for your work.