60,990 research outputs found
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher
is not vulnerable with respect to the partition-based trapdoor. This trapdoor
has been introduced, recently, by Bannier et al. (2016) and it generalizes that
introduced by Paterson in 1999. Moreover, we discuss the fact that studying the
group generated by the round functions of a block cipher may not be sufficient
to guarantee security against these trapdoors for the cipher.Comment: to be published on Advances in Mathematics of Communication
Proving uniformity and independence by self-composition and coupling
Proof by coupling is a classical proof technique for establishing
probabilistic properties of two probabilistic processes, like stochastic
dominance and rapid mixing of Markov chains. More recently, couplings have been
investigated as a useful abstraction for formal reasoning about relational
properties of probabilistic programs, in particular for modeling
reduction-based cryptographic proofs and for verifying differential privacy. In
this paper, we demonstrate that probabilistic couplings can be used for
verifying non-relational probabilistic properties. Specifically, we show that
the program logic pRHL---whose proofs are formal versions of proofs by
coupling---can be used for formalizing uniformity and probabilistic
independence. We formally verify our main examples using the EasyCrypt proof
assistant
A new topology on the space of Lorentzian metrics on a fixed manifold
We give a covariant definition of closeness between (time oriented)
Lorentzian metrics on a manifold M, using a family of functions which measure
the difference in volume form on one hand and the difference in causal
structure relative to a volume scale on the other hand. These functions will
distinguish two geometric properties of the Alexandrov sets relative to two space time points and and metrics and . It will be shown that this family generates uniformities and
consequently a topology on the space of Lorentzian metrics which is Hausdorff
when restricted to strongly causal metrics. This family of functions will
depend on parameters for a volume scale, a length scale (relative to the volume
scale) and an index which labels a submanifold with compact closure of the
given manifold M.Comment: 33 page
Wave-Shaped Round Functions and Primitive Groups
Round functions used as building blocks for iterated block ciphers, both in
the case of Substitution-Permutation Networks and Feistel Networks, are often
obtained as the composition of different layers which provide confusion and
diffusion, and key additions. The bijectivity of any encryption function,
crucial in order to make the decryption possible, is guaranteed by the use of
invertible layers or by the Feistel structure. In this work a new family of
ciphers, called wave ciphers, is introduced. In wave ciphers, round functions
feature wave functions, which are vectorial Boolean functions obtained as the
composition of non-invertible layers, where the confusion layer enlarges the
message which returns to its original size after the diffusion layer is
applied. This is motivated by the fact that relaxing the requirement that all
the layers are invertible allows to consider more functions which are optimal
with regard to non-linearity. In particular it allows to consider injective APN
S-boxes. In order to guarantee efficient decryption we propose to use wave
functions in Feistel Networks. With regard to security, the immunity from some
group-theoretical attacks is investigated. In particular, it is shown how to
avoid that the group generated by the round functions acts imprimitively, which
represent a serious flaw for the cipher
- …