A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications

224Citations
Citations of this article
55Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We initiate a theoretical investigation of the popular block-cipher design-goal of security against "related-key attacks" (RKAs). We begin by introducing definitions for the concepts of PRPs and PRFs secure against classes of RKAs, each such class being specified by an associated set of "related-key deriving (RKD) functions." Then for some such classes of attacks, we prove impossibility results, showing that no block-cipher can resist these attacks while, for other, related classes of attacks that include popular targets in the block cipher community, we prove possibility results that provide theoretical support for the view that security against them is achievable. Finally we prove security of various block-cipher based constructs that use related keys, including a tweakable block cipher given in [14]. © International Association for Cryptologic Research 2003.

References Powered by Scopus

How to construct random functions

1421Citations
N/AReaders
Get full text

How to construct pseudorandom permutations from pseudorandom functions

691Citations
N/AReaders
Get full text

Security of the cipher block chaining message authentication code

364Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Related-key cryptanalysis of the full AES-192 and AES-256

310Citations
N/AReaders
Get full text

Simple password-based encrypted key exchange protocols

278Citations
N/AReaders
Get full text

New proofs for NMAC and HMAC: Security without collision-resistance

218Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Bellare, M., & Kohno, T. (2003). A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2656, 491–506. https://doi.org/10.1007/3-540-39200-9_31

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 33

70%

Professor / Associate Prof. 6

13%

Researcher 5

11%

Lecturer / Post doc 3

6%

Readers' Discipline

Tooltip

Computer Science 38

81%

Engineering 5

11%

Physics and Astronomy 2

4%

Mathematics 2

4%

Article Metrics

Tooltip
Mentions
References: 1

Save time finding and organizing research with Mendeley

Sign up for free