Abstract

In this work, we study the security of Even–Mansour type ciphers whose encryption and decryption are based on a common primitive, namely an involution. Such ciphers possibly allow efficient hardware implementation as the same circuit is shared for encryption and decryption, and thus expected to be more suitable for lightweight environment in which low power consumption and implementation costs are desirable. With this motivation, we consider a single-round Even–Mansour cipher using an involution as its underlying primitive. The decryption of such a cipher is the same as encryption only with the order of the round keys reversed. It is known that such a cipher permits a birthday-bound attack using only construction queries, but whether it provides provable security in the range below the birthday bound has remained. We prove that the Even–Mansour cipher based on a random involution is as secure as the permutation-based one when the number of construction queries is limited by the birthday bound. In order to achieve security beyond the birthday bound, we propose a two-round Even–Mansour-like construction, dubbed $$\mathsf {EMSI}$$ , based on a single involution I using a fixed permutation $$\sigma $$ in the middle layer. Specifically, $$\mathsf {EMSI}$$ encrypts a plaintext u by computing $$\begin{aligned} v=I\left( \sigma \left( I(u\oplus k_0)\right) \oplus k_1\right) \oplus k_2 \end{aligned}$$ with the key schedule $$\gamma =(\gamma _0,\gamma _1,\gamma _2)$$ generating three round keys $$k_0=\gamma _0(k)$$ , $$k_1=\gamma _1(k)$$ and $$k_2=\gamma _2(k)$$ from an n-bit master key k. We prove that if the key schedule $$\gamma =(\gamma _0,\gamma _1,\gamma _2)$$ satisfies a certain condition, and $$\sigma $$ is a linear orthomorphism, then this construction is secure up to $$2^{\frac{2n}{3}}$$ construction and permutation queries. $$\mathsf {EMSI}$$ is the first construction that uses a single involution—a primitive weaker than a truly random permutation—and that provides security beyond the birthday bound at the same time. Encryption and decryption of $$\mathsf {EMSI}$$ are the same except for the key schedule and the middle layer. Since encryption and decryption are both based on a common primitive, $$\mathsf {EMSI}$$ is expected to be particularly suitable for modes of operation that use both encryption and decryption of the underlying block cipher such as OCB3.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.