1,054 research outputs found
Security in for the Xor of Two Random Permutations\\ -- Proof with the standard technique--
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In~\cite{P08a}, it is proved that we have security against CPA-2 attacks when , where is the number of queries and is the number of bits of the inputs
and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the
``standard H technique\u27\u27 instead of the `` technique\u27\u27. It will be interesting to
compare the two techniques, their similarities and the differences between the proofs and the
results
Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds
A secure n-bit tweakable block cipher (TBC) using t-bit tweaks can be modeled as a tweakable uniform random permutation, where each tweak defines an independent random n-bit permutation. When an input to this tweakable permutation is fixed, it can be viewed as a perfectly secure t-bit random function. On the other hand, when a tweak is fixed, it can be viewed as a perfectly secure n-bit random permutation, and it is well known that the sum of two random permutations is pseudorandom up to 2n queries.
A natural question is whether one can construct a pseudorandom function (PRF) beyond the block and the tweak length bounds using a small number of calls to the underlying tweakable permutations. A straightforward way of constructing a PRF from tweakable permutations is to xor the outputs from two tweakable permutations with c bits of the input to each permutation fixed. Using the multi-user security of the sum of two permutations, one can prove that the (t + n − c)-to-n bit PRF is secure up to 2n+c queries.
In this paper, we propose a family of PRF constructions based on tweakable permutations, dubbed XoTPc, achieving stronger security than the straightforward construction. XoTPc is parameterized by c, giving a (t + n − c)-to-n bit PRF. When t < 3n and c = t/3 , XoTPt/3 becomes an (n + 2t/3 )-to-n bit pseudorandom function, which is secure up to 2n+2t/3 queries. It provides security beyond the block and the tweak length bounds, making two calls to the underlying tweakable permutations. In order to prove the security of XoTPc, we extend Mirror theory to q ≫ 2n, where q is the number of equations. From a practical point of view, our construction can be used to construct TBC-based MAC finalization functions and CTR-type encryption modes with stronger provable security compared to existing schemes
Minimizing the Two-Round Tweakable Even-Mansour Cipher
In CRYPTO 2015, Cogliati et al. have proposed one-round tweakable Even-Mansour (\textsf{1-TEM}) cipher constructed out of a single -bit public permutation and a uniform and almost XOR-universal hash function \textsf{H} as , where is the tweak, and is the -bit message. Authors have shown that its two-round extension, which we refer to as \textsf{2-TEM}, obtained by cascading -independent instances of the construction gives -bit security and -round cascading gives -bit security. In ASIACRYPT 2015, Cogliati and Seurin have shown that four-round tweakable Even-Mansour cipher, which we refer to as \textsf{4-TEM}, constructed out of four independent -bit permutations and two independent -bit keys , defined as is secure upto adversarial queries. In this paper, we have shown that if we replace two independent permutations of \textsf{2-TEM} (Cogliati et al., CRYPTO 2015) with a single -bit public permutation, then the resultant construction still guarrantees security upto adversarial queries. Using the results derived therein, we also show that replacing the permutation with in the above equation preserves security upto adversarial queries
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the Method
The construction (bitwise-xor of outputs of two independent -bit random permutations) has gained broad attention over the last two decades due to its high security. Very recently, Dai \textit{et al.} (CRYPTO\u2717), by using a method which they term the {\em Chi-squared method} ( method), have shown -bit security of when the underlying random permutations are kept secret to the adversary. In this work, we consider the case where the underlying random permutations are publicly available to the adversary. The best known security of in this security game (also known as {\em indifferentiable security}) is -bit, due to Mennink \textit{et al.} (ACNS\u2715). Later, Lee (IEEE-IT\u2717) proved a better -bit security for the general construction which returns the xor of () independent random permutations. However, the security was shown only for the cases where is an even integer. In this paper, we improve all these known bounds and prove full, {\em i.e.,} -bit (indifferentiable) security of as well as for any . Our main result is -bit security of , and we use the method to prove it
A Note on the Chi-square Method : A Tool for Proving Cryptographic Security
In CRYPTO 2017, Dai, Hoang, and Tessaro introduced the {\em Chi-square method} ( method) which can be applied to obtain an upper bound on the statistical distance between two joint probability distributions.
The authors applied this method to prove the {\em pseudorandom function security} (PRF-security) of sum of two random permutations. In this work, we revisit their proof and find a non-trivial gap in the proof and describe how to plug this gap as well; this has already been done by Dai {\em et al.} in the revised version of their CRYPTO 2017 paper. A complete, correct, and transparent proof of the full security of the sum of two random permutations construction is much desirable, especially due to its importance and two decades old legacy. The proposed method seems to have potential for application to similar problems, where a similar gap may creep into a proof. These considerations motivate us to communicate our observation in a formal way.\par
On the positive side, we provide a very simple proof of the PRF-security of the {\em truncated random permutation} construction (a method to construct PRF from a random permutation) using the method. We note that a proof of the PRF-security due to Stam is already known for this construction in a purely statistical context. However, the use of the method makes the proof much simpler
Generic Attacks for the Xor of k random permutations
\begin{abstract}
Xoring the output of permutations, is a very simple way to construct pseudo-random functions (PRF) from pseudo-random
permutations (PRP). Moreover such construction has many applications in cryptography (see \cite{BI,BKrR,HWKS,SL} for example).
Therefore it is interesting both from a theoretical and from a practical point of view, to get precise security results
for this construction.
In this paper, we will describe the best attacks that we have found on the Xor of random
-bit to -bit permutations. When , we will get an attack of computational complexity . This result was
already stated in \cite{BI}. On the contrary, for , our analysis is new. We will see that the best known attacks require much more than computations when not all of the outputs are given, or when the function is changed on a few points. We obtain like this a new and very simple design that can be very usefull when a security larger than is wanted, for example when is very small.
\end{abstract
Revisiting the Indifferentiability of the Sum of Permutations
The sum of two n-bit pseudorandom permutations is known to behave like a pseudorandom function with n bits of security. A recent line of research has investigated the security of two public n-bit permutations and its degree of indifferentiability. Mandal et al. (INDOCRYPT 2010) proved 2n/3-bit security, Mennink and Preneel (ACNS 2015) pointed out a non-trivial flaw in their analysis and re-proved (2n/3-\log_2(n))-bit security. Bhattacharya and Nandi (EUROCRYPT 2018) eventually improved the result to n-bit security. Recently, Gunsing at CRYPTO 2022 already observed that a proof technique used in this line of research only holds for sequential indifferentiability. We revisit the line of research in detail, and observe that the strongest bound of n-bit security has two other serious issues in the reasoning, the first one is actually the same non-trivial flaw that was present in the work of Mandal et al., while the second one discards biases in the randomness influenced by the distinguisher. More concretely, we introduce two attacks that show limited potential of different approaches. We (i) show that the latter issue that discards biases only holds up to 2^{3n/4} queries, and (ii) perform a differentiability attack against their simulator in 2^{5n/6} queries. On the upside, we revive the result of Mennink and Preneel and show (2n/3-\log_2(n))-bit regular indifferentiability security of the sum of public permutations
Revisiting the Indifferentiability of the Sum of Permutations
The sum of two -bit pseudorandom permutations is known to behave like a pseudorandom function with bits of security. A recent line of research has investigated the security of two public -bit permutations and its degree of indifferentiability. Mandal et al. (INDOCRYPT 2010) proved -bit security, Mennink and Preneel (ACNS 2015) pointed out a non-trivial flaw in their analysis and re-proved -bit security. Bhattacharya and Nandi (EUROCRYPT 2018) eventually improved the result to -bit security. Recently, Gunsing at CRYPTO 2022 already observed that a proof technique used in this line of research only holds for sequential indifferentiability. We revisit the line of research in detail, and observe that the strongest bound of -bit security has two other serious issues in the reasoning, the first one is actually the same non-trivial flaw that was present in the work of Mandal et al., while the second one discards biases in the randomness influenced by the distinguisher. More concretely, we introduce two attacks that show limited potential of different approaches. We (i) show that the latter issue that discards biases only holds up to queries, and (ii) perform a differentiability attack against their simulator in queries. On the upside, we revive the result of Mennink and Preneel and show -bit regular indifferentiability security of the sum of public permutations
Minimizing the Two-Round Even-Mansour Cipher
The -round (iterated) \emph{Even-Mansour cipher} (also known as \emph{key-alternating cipher}) defines a block cipher from fixed public -bit permutations as follows: given a sequence of -bit round keys , an -bit plaintext is encrypted by xoring round key , applying permutation , xoring round key , etc. The (strong) pseudorandomness of this construction in the random permutation model (i.e., when the permutations are public random permutation oracles that the adversary can query in a black-box way) was studied in a number of recent papers, culminating with the work of Chen and Steinberger (EUROCRYPT~2014), who proved that the -round Even-Mansour cipher is indistinguishable from a truly random permutation up to queries of any adaptive adversary (which is an optimal security bound since it matches a simple distinguishing attack). All results in this entire line of work share the common restriction that they only hold under the assumption that \emph{the round keys and the permutations are independent}. In particular, for two rounds, the current state of knowledge is that the block cipher is provably secure up to queries of the adversary, when , , and are three independent -bit keys, and and are two independent random -bit permutations. In this paper, we ask whether one can obtain a similar bound for the two-round Even-Mansour cipher \emph{from just one -bit key and one -bit permutation}. Our answer is positive: when the three -bit round keys , , and are adequately derived from an -bit master key , and the same permutation is used in place of and , we prove a qualitatively similar security bound (in the random permutation model). To the best of our knowledge, this is the first ``beyond the birthday bound\u27\u27 security result for AES-like ciphers that does not assume independent round keys
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Game-playing proofs constitute a powerful framework for non-quantum
cryptographic security arguments, most notably applied in the context of
indifferentiability. An essential ingredient in such proofs is lazy sampling of
random primitives. We develop a quantum game-playing proof framework by
generalizing two recently developed proof techniques. First, we describe how
Zhandry's compressed quantum oracles~(Crypto'19) can be used to do quantum lazy
sampling of a class of non-uniform function distributions. Second, we observe
how Unruh's one-way-to-hiding lemma~(Eurocrypt'14) can also be applied to
compressed oracles, providing a quantum counterpart to the fundamental lemma of
game-playing. Subsequently, we use our game-playing framework to prove quantum
indifferentiability of the sponge construction, assuming a random internal
function
- …