We initiate the study of symmetric encryption in a regime where the memory of the adversary is bounded. For a block cipher with n-bit blocks, we present modes of operation for encryption and authentication that guarantee security beyond 2n encrypted/authenticated messages, as long as (1) the adversary’s memory is restricted to be less than 2n bits, and (2) the key of the block cipher is long enough to mitigate memory-less key-search attacks. This is the first proposal of a setting which allows to bypass the 2n barrier under a reasonable assumption on the adversarial resources. Motivated by the above, we also discuss the problem of stretching the key of a block cipher in the setting where the memory of the adversary is bounded. We show a tight equivalence between the security of double encryption in the ideal-cipher model and the hardness of a special case of the element distinctness problem, which we call the list-disjointness problem. Our result in particular implies a conditional lower bound on time-memory trade-offs to break PRP security of double encryption, assuming optimality of the worst-case complexity of existing algorithms for list disjointness.
CITATION STYLE
Tessaro, S., & Thiruvengadam, A. (2018). Provable time-memory trade-offs: Symmetric cryptography against memory-bounded adversaries. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11239 LNCS, pp. 3–32). Springer Verlag. https://doi.org/10.1007/978-3-030-03807-6_1
Mendeley helps you to discover research relevant for your work.