Beyond-birthday-bound security for tweakable even-mansour ciphers with linear tweak and key mixing

24Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The iterated Even-Mansour construction defines a block cipher from a tuple of public n-bit permutations (P1,…,Pr) by alternatively xoring some n-bit round key ki, i = 0,..., r, and applying permutation Pi to the state. The tweakable Even-Mansour construction generalizes the conventional Even-Mansour construction by replacing the n-bit round keys by n-bit strings derived from a master key and a tweak, thereby defining a tweakable block cipher. Constructions of this type have been previously analyzed, but they were either secure only up to the birthday bound, or they used a nonlinear mixing function of the key and the tweak (typically, multiplication of the key and the tweak seen as elements of some finite field) which might be costly to implement. In this paper, we tackle the question of whether it is possible to achieve beyond-birthday-bound security for such a construction by using only linear operations for mixing the key and the tweak into the state. We answer positively, describing a 4-round construction with a 2n-bit master key and an n-bit tweak which is provably secure in the Random Permutation Model up to roughly 22n/3 adversarial queries.

Cite

CITATION STYLE

APA

Cogliati, B., & Seurin, Y. (2015). Beyond-birthday-bound security for tweakable even-mansour ciphers with linear tweak and key mixing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9453, pp. 134–158). Springer Verlag. https://doi.org/10.1007/978-3-662-48800-3_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free