首页 > 最新文献

IACR Transactions on Symmetric Cryptology最新文献

英文 中文
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives MPC/FHE/ zk友好对称密钥基元上密码分析方法的联系
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-16 DOI: 10.46586/tosc.v2023.i2.132-175
Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu
Symmetric-key primitives designed over the prime field Fp with odd characteristics, rather than the traditional Fn2 , are becoming the most popular choice for MPC/FHE/ZK-protocols for better efficiencies. However, the security of Fp is less understood as there are highly nontrivial gaps when extending the cryptanalysis tools and experiences built on Fn2 in the past few decades to Fp.At CRYPTO 2015, Sun et al. established the links among impossible differential, zero-correlation linear, and integral cryptanalysis over Fn2 from the perspective of distinguishers. In this paper, following the definition of linear correlations over Fp by Baignères, Stern and Vaudenay at SAC 2007, we successfully establish comprehensive links over Fp, by reproducing the proofs and offering alternatives when necessary. Interesting and important differences between Fp and Fn2 are observed.- Zero-correlation linear hulls can not lead to integral distinguishers for some cases over Fp, while this is always possible over Fn2proven by Sun et al..- When the newly established links are applied to GMiMC, its impossible differential, zero-correlation linear hull and integral distinguishers can be increased by up to 3 rounds for most of the cases, and even to an arbitrary number of rounds for some special and limited cases, which only appeared in Fp. It should be noted that all these distinguishers do not invalidate GMiMC’s security claims.The development of the theories over Fp behind these links, and properties identified (be it similar or different) will bring clearer and easier understanding of security of primitives in this emerging Fp field, which we believe will provide useful guides for future cryptanalysis and design.
在素数域Fp上设计的具有奇数特征的对称键原语,而不是传统的Fn2,正成为MPC/FHE/ zk协议中最受欢迎的选择,以提高效率。然而,Fp的安全性很少被理解,因为在将过去几十年建立在Fn2上的密码分析工具和经验扩展到Fp时存在高度重要的差距。在CRYPTO 2015上,Sun等人从区分符的角度建立了Fn2上不可能微分、零相关线性和积分密码分析之间的联系。在本文中,遵循baignires, Stern和Vaudenay在SAC 2007上对Fp上的线性相关的定义,我们通过复制证明并在必要时提供替代方案,成功地建立了Fp上的综合链接。观察到Fp和Fn2之间有趣而重要的差异。-在某些情况下,零相关线性船体在Fp上不能导致积分区分,而在fn2上这总是可能的,Sun等人证明了这一点。当新建立的链接应用于GMiMC时,其不可能的微分,零相关线性船体和积分区分器在大多数情况下最多可以增加3轮,甚至在一些特殊和有限的情况下可以增加任意数量的轮数,这只出现在Fp中。应该指出的是,所有这些区别并不使GMiMC的安全主张无效。这些链接背后的Fp理论的发展,以及所识别的属性(无论是相似的还是不同的)将使这个新兴的Fp领域对原语的安全性有更清晰、更容易的理解,我们相信这将为未来的密码分析和设计提供有用的指导。
{"title":"Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives","authors":"Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu","doi":"10.46586/tosc.v2023.i2.132-175","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i2.132-175","url":null,"abstract":"Symmetric-key primitives designed over the prime field Fp with odd characteristics, rather than the traditional Fn2 , are becoming the most popular choice for MPC/FHE/ZK-protocols for better efficiencies. However, the security of Fp is less understood as there are highly nontrivial gaps when extending the cryptanalysis tools and experiences built on Fn2 in the past few decades to Fp.At CRYPTO 2015, Sun et al. established the links among impossible differential, zero-correlation linear, and integral cryptanalysis over Fn2 from the perspective of distinguishers. In this paper, following the definition of linear correlations over Fp by Baignères, Stern and Vaudenay at SAC 2007, we successfully establish comprehensive links over Fp, by reproducing the proofs and offering alternatives when necessary. Interesting and important differences between Fp and Fn2 are observed.- Zero-correlation linear hulls can not lead to integral distinguishers for some cases over Fp, while this is always possible over Fn2proven by Sun et al..- When the newly established links are applied to GMiMC, its impossible differential, zero-correlation linear hull and integral distinguishers can be increased by up to 3 rounds for most of the cases, and even to an arbitrary number of rounds for some special and limited cases, which only appeared in Fp. It should be noted that all these distinguishers do not invalidate GMiMC’s security claims.The development of the theories over Fp behind these links, and properties identified (be it similar or different) will bring clearer and easier understanding of security of primitives in this emerging Fp field, which we believe will provide useful guides for future cryptanalysis and design.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"PP 1","pages":"132-175"},"PeriodicalIF":3.5,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84287911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers 从n位块密码进行大调整的最佳安全可调整块密码
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-16 DOI: 10.46586/tosc.v2023.i2.47-68
Yaobin Shen, François-Xavier Standaert
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al. at Asiacrypt’16 proposed constructions that can achieve 2n security. Yet, these constructions can have a tweak size up to n-bit only. As evident from recent research, a tweakable block cipher with a large tweak is generally helpful as a building block for modes of operation, typical applications including MACs, authenticated encryption, leakage-resistant cryptography and full-disk encryption.We begin with how to design a tweakable block cipher with 2n-bit tweak and n-bit security from two block cipher calls. For this purpose, we do an exhaustive search for tweakable block ciphers with 2n-bit tweaks from two block cipher calls, and show that all of them suffer from birthday-bound attacks. Next, we investigate the possibility to design a tweakable block cipher with 2n-bit tweak and n-bit security from three block cipher calls. We start with some conditions to build such a tweakable block cipher and propose a natural construction, called G̃1, that likely meets them. After inspection, we find a weakness in G̃1 which leads to a birthday-bound attack. Based on G̃1, we then propose another construction, called G̃2, that can avoid this weakness. We finally prove that G̃2 can achieve n-bit security with 2n-bit tweak.
我们考虑从输入和输出大小为n位的分组密码设计一个可调分组密码。主要目标是通过大调整(即超过n位)实现2n安全性。此前,Mennink在FSE ' 15和Wang等人在Asiacrypt ' 16提出了可以实现2n安全性的结构。然而,这些结构的调整大小可能只有n位。从最近的研究中可以看出,具有较大调整的可调整分组密码通常有助于作为操作模式的构建块,典型应用包括mac,身份验证加密,防泄漏加密和全磁盘加密。我们从如何设计一个可调整的分组密码开始,通过两个分组密码调用来实现2n位的调整和n位的安全性。为此,我们从两个分组密码调用中对具有2n位调整的可调整分组密码进行了详尽的搜索,并表明它们都遭受了生日绑定攻击。接下来,我们研究了从三个分组密码调用中设计具有2n位微调和n位安全性的可调分组密码的可能性。我们从构建这样一个可调整的分组密码的一些条件开始,并提出一个可能满足这些条件的自然结构,称为G / 1。经过检查,我们发现了g_1的一个弱点,这导致了生日限制攻击。基于g1,我们提出了另一种结构,称为g2,可以避免这个弱点。最后证明了g_2可以通过2n位的调整实现n位的安全性。
{"title":"Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers","authors":"Yaobin Shen, François-Xavier Standaert","doi":"10.46586/tosc.v2023.i2.47-68","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i2.47-68","url":null,"abstract":"We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al. at Asiacrypt’16 proposed constructions that can achieve 2n security. Yet, these constructions can have a tweak size up to n-bit only. As evident from recent research, a tweakable block cipher with a large tweak is generally helpful as a building block for modes of operation, typical applications including MACs, authenticated encryption, leakage-resistant cryptography and full-disk encryption.We begin with how to design a tweakable block cipher with 2n-bit tweak and n-bit security from two block cipher calls. For this purpose, we do an exhaustive search for tweakable block ciphers with 2n-bit tweaks from two block cipher calls, and show that all of them suffer from birthday-bound attacks. Next, we investigate the possibility to design a tweakable block cipher with 2n-bit tweak and n-bit security from three block cipher calls. We start with some conditions to build such a tweakable block cipher and propose a natural construction, called G̃1, that likely meets them. After inspection, we find a weakness in G̃1 which leads to a birthday-bound attack. Based on G̃1, we then propose another construction, called G̃2, that can avoid this weakness. We finally prove that G̃2 can achieve n-bit security with 2n-bit tweak.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"29 1","pages":"47-68"},"PeriodicalIF":3.5,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73522553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Duplex and Its Security 了解双工及其安全性
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-16 DOI: 10.46586/tosc.v2023.i2.1-46
Bart Mennink
At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build permutation based authenticated encryption schemes. The construction was generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). Daemen et al. (ASIACRYPT 2017) generalized it further to cover much more use cases, and proved security of this general construction, and Dobraunig and Mennink (ASIACRYPT 2019) derived a leakage resilience security bound for this construction. Due to its generality, the full-state keyed duplex construction that we know today has plethora applications, but the flip side of the coin is that the general construction is hard to grasp and the corresponding security bounds are very complex. Consequently, the state-of-the-art results on the full-state keyed duplex construction are not used to the fullest. In this work, we revisit the history of the duplex construction, give a comprehensive discussion of its possibilities and limitations, and demonstrate how the two security bounds (of Daemen et al. and Dobraunig and Mennink) can be interpreted in particular applications of the duplex.
在SAC 2011上,Bertoni等人介绍了键控双工构造作为构建基于排列的身份验证加密方案的工具。Mennink等人(ASIACRYPT 2015)将这种结构推广到全态吸收。Daemen等人(ASIACRYPT 2017)进一步推广了它,以涵盖更多的用例,并证明了这种一般结构的安全性,Dobraunig和Mennink (ASIACRYPT 2019)推导了这种结构的泄漏弹性安全边界。由于其通用性,我们今天所知道的全状态键控双工结构有大量的应用,但硬币的另一面是,一般结构很难掌握,相应的安全界限非常复杂。因此,在全状态键控双工结构上的最新成果没有得到充分利用。在这项工作中,我们回顾了双工结构的历史,对其可能性和局限性进行了全面的讨论,并演示了如何在双工的特定应用中解释两个安全边界(Daemen等人以及Dobraunig和Mennink)。
{"title":"Understanding the Duplex and Its Security","authors":"Bart Mennink","doi":"10.46586/tosc.v2023.i2.1-46","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i2.1-46","url":null,"abstract":"At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build permutation based authenticated encryption schemes. The construction was generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). Daemen et al. (ASIACRYPT 2017) generalized it further to cover much more use cases, and proved security of this general construction, and Dobraunig and Mennink (ASIACRYPT 2019) derived a leakage resilience security bound for this construction. Due to its generality, the full-state keyed duplex construction that we know today has plethora applications, but the flip side of the coin is that the general construction is hard to grasp and the corresponding security bounds are very complex. Consequently, the state-of-the-art results on the full-state keyed duplex construction are not used to the fullest. In this work, we revisit the history of the duplex construction, give a comprehensive discussion of its possibilities and limitations, and demonstrate how the two security bounds (of Daemen et al. and Dobraunig and Mennink) can be interpreted in particular applications of the duplex.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"27 1","pages":"1-46"},"PeriodicalIF":3.5,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74205573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing 对类aes哈希的经典和量子相遇的诺查丹玛斯攻击
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-16 DOI: 10.46586/tosc.v2023.i2.224-252
Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the attacker. Consequently, the attacker can pretend to predict some event represented by P she did not know before, and thus this type of attack is also known as the Nostradamus attack. At ASIACRYPT 2022, Benedikt et al. convert Kelsey et al.’s attack to a quantum one, reducing the time complexity from O(√n · 22n/3) to O( 3√n · 23n/7). CTFP preimage attack is less investigated in the literature than (second-)preimage and collision attacks and lacks dedicated methods. In this paper, we propose the first dedicated Nostradamus attack based on the meet-in-the-middle (MITM) attack, and the MITM Nostradamus attack could be up to quadratically accelerated in the quantum setting. According to the recent works on MITM preimage attacks on AES-like hashing, we build an automatic tool to search for optimal MITM Nostradamus attacks and model the tradeoff between the offline and online phases. We apply our method to AES-MMO and Whirlpool, and obtain the first dedicated attack on round-reduced version of these hash functions. Our method and automatic tool are applicable to other AES-like hashings.
在EUROCRYPT 2006上,Kelsey和Kohno提出了所谓的选择目标强制前缀(CTFP)预像攻击,其中对于任何挑战前缀P,攻击者可以对攻击者事先发布的某个哈希值y生成H(P∥S) = y的后缀S。因此,攻击者可以假装预测一些她以前不知道的P所代表的事件,因此这种类型的攻击也被称为诺查丹玛斯攻击。在ASIACRYPT 2022上,Benedikt等人将Kelsey等人的攻击转换为量子攻击,将时间复杂度从O(√n·22n/3)降低到O(3√n·23n/7)。与(二次)预像攻击和碰撞攻击相比,文献中对CTFP预像攻击的研究较少,并且缺乏专门的方法。在本文中,我们提出了第一个基于中间相遇(meet-in-the-middle, MITM)攻击的专用诺查丹玛斯攻击,并且MITM诺查丹玛斯攻击在量子设置下可以达到二次加速。根据最近对类aes哈希的MITM预映像攻击的研究,我们构建了一个自动工具来搜索最优的MITM诺查丹玛斯攻击,并对离线和在线阶段之间的权衡进行建模。我们将该方法应用于AES-MMO和Whirlpool,并获得了针对这些哈希函数的轮约简版本的第一个专用攻击。我们的方法和自动工具适用于其他类aes散列。
{"title":"Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing","authors":"Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu","doi":"10.46586/tosc.v2023.i2.224-252","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i2.224-252","url":null,"abstract":"At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the attacker. Consequently, the attacker can pretend to predict some event represented by P she did not know before, and thus this type of attack is also known as the Nostradamus attack. At ASIACRYPT 2022, Benedikt et al. convert Kelsey et al.’s attack to a quantum one, reducing the time complexity from O(√n · 22n/3) to O( 3√n · 23n/7). CTFP preimage attack is less investigated in the literature than (second-)preimage and collision attacks and lacks dedicated methods. In this paper, we propose the first dedicated Nostradamus attack based on the meet-in-the-middle (MITM) attack, and the MITM Nostradamus attack could be up to quadratically accelerated in the quantum setting. According to the recent works on MITM preimage attacks on AES-like hashing, we build an automatic tool to search for optimal MITM Nostradamus attacks and model the tradeoff between the offline and online phases. We apply our method to AES-MMO and Whirlpool, and obtain the first dedicated attack on round-reduced version of these hash functions. Our method and automatic tool are applicable to other AES-like hashings.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"608 1","pages":"224-252"},"PeriodicalIF":3.5,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84247456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256 全轮TinyJAMBU-192/256的实用相关密钥伪造攻击
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-16 DOI: 10.46586/tosc.v2023.i2.176-188
O. Dunkelman, Shibam Ghosh, Eran Lambooij
TinyJAMBU is one of the finalists in the NIST lightweight cryptography competition. It is considered to be one of the more efficient ciphers in the competition and has undergone extensive analysis in recent years as both the keyed permutation as well as the mode are new designs. In this paper we present a related-key forgery attack on the updated TinyJAMBU-v2 scheme with 256- and 192-bit keys. We introduce a high probability related-key differential attack where the differences are only introduced into the key state. Therefore, the characteristic is applicable to the TinyJAMBU mode and can be used to mount a forgery attack. The time and data complexity of the forgery are 233 using 214 related-keys for the 256-bit key version, and 243 using 216 related-keys for the 192-bit key version.For the 128-bit key we construct a related-key differential characteristic on the full keyed permutation of TinyJAMBU with a probability of 2−16. We extend the relatedkey differential characteristics on TinyJAMBU to practical-time key-recovery attacks that extract the full key from the keyed permutation with a time and data complexity of 224, 221, and 219 for respectively the 128-, 192-, and 256-bit key variants.All characteristics are experimentally verified and we provide key nonce pairs that produce the same tag to show the feasibility of the forgery attack. We note that the designers do not claim related-key security, however, the attacks proposed in this paper suggest that the scheme is not key-commiting, which has been recently identified as a favorable property for AEAD schemes.
TinyJAMBU是NIST轻量级密码学竞赛的决赛选手之一。它被认为是竞争中效率较高的密码之一,近年来由于其关键字排列和模式都是新的设计而进行了广泛的分析。在本文中,我们提出了一种针对更新后的使用256位和192位密钥的TinyJAMBU-v2方案的相关密钥伪造攻击。我们引入了一种高概率相关密钥差分攻击,其中差异仅被引入密钥状态。因此,该特性适用于“TinyJAMBU”模式,可用于发起伪造攻击。对于256位密钥版本,使用214个相关密钥进行伪造的时间和数据复杂性为233,对于192位密钥版本,使用216个相关密钥进行伪造的时间和数据复杂性为243。对于128位密钥,我们在TinyJAMBU的全键排列上构造了一个相关密钥差分特征,其概率为2−16。我们将TinyJAMBU上的相关密钥差异特征扩展到实际时间密钥恢复攻击,该攻击从密钥排列中提取完整密钥,对于128位、192位和256位密钥变体,其时间和数据复杂度分别为224、221和219。所有特征都经过实验验证,我们提供了产生相同标签的密钥nonce对,以显示伪造攻击的可行性。我们注意到设计人员并没有声称相关密钥安全,然而,本文中提出的攻击表明该方案不是密钥提交,这最近被认为是AEAD方案的一个有利特性。
{"title":"Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256","authors":"O. Dunkelman, Shibam Ghosh, Eran Lambooij","doi":"10.46586/tosc.v2023.i2.176-188","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i2.176-188","url":null,"abstract":"TinyJAMBU is one of the finalists in the NIST lightweight cryptography competition. It is considered to be one of the more efficient ciphers in the competition and has undergone extensive analysis in recent years as both the keyed permutation as well as the mode are new designs. In this paper we present a related-key forgery attack on the updated TinyJAMBU-v2 scheme with 256- and 192-bit keys. We introduce a high probability related-key differential attack where the differences are only introduced into the key state. Therefore, the characteristic is applicable to the TinyJAMBU mode and can be used to mount a forgery attack. The time and data complexity of the forgery are 233 using 214 related-keys for the 256-bit key version, and 243 using 216 related-keys for the 192-bit key version.For the 128-bit key we construct a related-key differential characteristic on the full keyed permutation of TinyJAMBU with a probability of 2−16. We extend the relatedkey differential characteristics on TinyJAMBU to practical-time key-recovery attacks that extract the full key from the keyed permutation with a time and data complexity of 224, 221, and 219 for respectively the 128-, 192-, and 256-bit key variants.All characteristics are experimentally verified and we provide key nonce pairs that produce the same tag to show the feasibility of the forgery attack. We note that the designers do not claim related-key security, however, the attacks proposed in this paper suggest that the scheme is not key-commiting, which has been recently identified as a favorable property for AEAD schemes.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"250 1","pages":"176-188"},"PeriodicalIF":3.5,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80342441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly Symmetric Primitives MPC-/ZK-/ fhe友好对称基元的Fnp上有界满射二次函数
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-16 DOI: 10.46586/tosc.v2023.i2.94-131
Lorenzo Grassi
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), many MPC-, FHE- and ZK-friendly symmetric-key primitives that minimize the< number of multiplications over Fp for a large prime p have been recently proposed in the literature. These symmetric primitives are usually defined via invertible functions, including (i) Feistel and Lai-Massey schemes and (ii) SPN constructions instantiated with invertible non-linear S-Boxes. However, the “invertibility” property is actually never required in any of the mentioned applications.In this paper, we discuss the possibility to set up MPC-/FHE-/ZK-friendly symmetric primitives instantiated with non-invertible bounded surjective functions. In contrast to one-to-one functions, each output of a l-bounded surjective function admits at most l pre-images. The simplest example is the square map x → x2 over Fp for a prime p ≥ 3, which is (obviously) 2-bounded surjective. When working over Fnp for n ≥ 2, we set up bounded surjective functions by re-considering the recent results proposed by Grassi, Onofri, Pedicini and Sozzi at FSE/ToSC 2022 as starting points. Given a quadratic local map F : Fmp → Fp for m ∈ {1, 2, 3}, they proved that the shift-invariant non-linear function over Fnp defined as SF (x0, x1, . . . , xn−1) = y0∥y1∥ . . . ∥yn−1 where yi := F(xi, xi+1) is never invertible for any n ≥ 2 · m − 1. Here, we prove that • the quadratic function F : Fmp → Fp for m ∈ {1, 2} that minimizes the probability of having a collision for SF over Fnp is of the form F(x0, x1) = x20 + x1 (or equivalent);• the function SF over Fnp defined as before via F(x0, x1) = x20 +x1 (or equivalent) is 2n-bounded surjective.As concrete applications, we propose modified versions of the MPC-friendly schemes MiMC, HadesMiMC, and (partially of) Hydra, and of the FHE-friendly schemes Masta, Pasta, and Rubato. By instantiating them with the bounded surjective quadratic functions proposed in this paper, we are able to improve the security and/or the performances in the target applications/protocols.
在诸如安全多方计算(MPC)、完全同态加密(FHE)和零知识证明(ZK)等新应用的推动下,最近在文献中提出了许多MPC、FHE和ZK友好的对称密钥原语,这些原语可以最小化大素数p在Fp上的乘法次数。这些对称原语通常通过可逆函数定义,包括(i) Feistel和Lai-Massey格式和(ii)用可逆非线性s盒实例化的SPN结构。然而,在上述任何应用程序中实际上都不需要“可逆性”属性。本文讨论了用不可逆有界满射函数实例化MPC-/FHE-/ zk -友好对称基元的可能性。与一对一函数相反,l有界满射函数的每个输出最多允许l个预像。最简单的例子是素数p≥3时的平方映射x→x2 / Fp,它显然是有2界满射。当n≥2时在Fnp上工作时,我们通过重新考虑Grassi, Onofri, Pedicini和Sozzi在FSE/ToSC 2022上提出的最新结果作为起点,建立了有界满射函数。给定m∈{1,2,3}的二次局部映射F: Fmp→Fp,证明了Fnp上的平移不变非线性函数定义为SF (x0, x1,…), xn−1)= y0∥y1∥…对于任意n≥2·m−1,∥yn−1,其中yi:= F(xi, xi+1)不可逆。在这里,我们证明了对于m∈{1,2},使SF在Fnp上发生碰撞的概率最小的二次函数F: Fmp→Fp的形式为F(x0, x1) = x20 +x1(或等价);•前面通过F(x0, x1) = x20 +x1(或等价)定义的函数SF在Fnp上是2n有界满射。作为具体应用,我们提出了mpc友好方案MiMC、HadesMiMC和Hydra(部分)的修改版本,以及fhe友好方案Masta、Pasta和Rubato的修改版本。通过用本文提出的有界满射二次函数实例化它们,我们能够提高目标应用/协议的安全性和/或性能。
{"title":"Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly Symmetric Primitives","authors":"Lorenzo Grassi","doi":"10.46586/tosc.v2023.i2.94-131","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i2.94-131","url":null,"abstract":"Motivated by new applications such as secure Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), many MPC-, FHE- and ZK-friendly symmetric-key primitives that minimize the< number of multiplications over Fp for a large prime p have been recently proposed in the literature. These symmetric primitives are usually defined via invertible functions, including (i) Feistel and Lai-Massey schemes and (ii) SPN constructions instantiated with invertible non-linear S-Boxes. However, the “invertibility” property is actually never required in any of the mentioned applications.In this paper, we discuss the possibility to set up MPC-/FHE-/ZK-friendly symmetric primitives instantiated with non-invertible bounded surjective functions. In contrast to one-to-one functions, each output of a l-bounded surjective function admits at most l pre-images. The simplest example is the square map x → x2 over Fp for a prime p ≥ 3, which is (obviously) 2-bounded surjective. When working over Fnp for n ≥ 2, we set up bounded surjective functions by re-considering the recent results proposed by Grassi, Onofri, Pedicini and Sozzi at FSE/ToSC 2022 as starting points. Given a quadratic local map F : Fmp → Fp for m ∈ {1, 2, 3}, they proved that the shift-invariant non-linear function over Fnp defined as SF (x0, x1, . . . , xn−1) = y0∥y1∥ . . . ∥yn−1 where yi := F(xi, xi+1) is never invertible for any n ≥ 2 · m − 1. Here, we prove that • the quadratic function F : Fmp → Fp for m ∈ {1, 2} that minimizes the probability of having a collision for SF over Fnp is of the form F(x0, x1) = x20 + x1 (or equivalent);• the function SF over Fnp defined as before via F(x0, x1) = x20 +x1 (or equivalent) is 2n-bounded surjective.As concrete applications, we propose modified versions of the MPC-friendly schemes MiMC, HadesMiMC, and (partially of) Hydra, and of the FHE-friendly schemes Masta, Pasta, and Rubato. By instantiating them with the bounded surjective quadratic functions proposed in this paper, we are able to improve the security and/or the performances in the target applications/protocols.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"65 1","pages":"94-131"},"PeriodicalIF":3.5,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74598285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EliMAC: Speeding Up LightMAC by around 20% EliMAC:将LightMAC的速度提高20%左右
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-16 DOI: 10.46586/tosc.v2023.i2.69-93
Christoph Dobraunig, Bart Mennink, Samuel Neves
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs are always built on top of a PRP. In such case, one employs a relatively strong primitive to obtain a function with a relatively weak security model. In this work, we present EliHash, a construction of a parallel universal hash function from non-compressing universal hash functions, and we back it up with supporting security analysis. We use this construction to design EliMAC, a message authentication code similar to LightMAC. We consider a heuristic instantiation of EliMAC with roundreduced AES, and argue that this instantiation of EliMAC is much more efficient than LightMAC, it is around 21% faster, and additionally allows for precomputation of the keys, albeit with a stronger assumption on the AES primitive than in LightMAC. These observations are backed up with an implementation of our scheme.
通用哈希函数在消息认证码等的设计中起着重要的作用。尽管已知如何构建高效的顺序通用哈希函数,但并行非代数通用哈希函数设计总是建立在PRP之上。在这种情况下,可以使用相对较强的原语来获得具有相对较弱安全性模型的函数。在这项工作中,我们提出了EliHash,一个由非压缩通用哈希函数构造的并行通用哈希函数,并通过支持安全性分析来支持它。我们使用这种结构来设计与LightMAC类似的消息验证码EliMAC。我们考虑了一个带有圆形AES的启发式实例化的EliMAC,并认为这种实例化的EliMAC比LightMAC更有效,它大约快21%,并且另外允许预计算密钥,尽管对AES原文的假设比LightMAC更强。这些观察结果以我们方案的实施为依据。
{"title":"EliMAC: Speeding Up LightMAC by around 20%","authors":"Christoph Dobraunig, Bart Mennink, Samuel Neves","doi":"10.46586/tosc.v2023.i2.69-93","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i2.69-93","url":null,"abstract":"Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs are always built on top of a PRP. In such case, one employs a relatively strong primitive to obtain a function with a relatively weak security model. In this work, we present EliHash, a construction of a parallel universal hash function from non-compressing universal hash functions, and we back it up with supporting security analysis. We use this construction to design EliMAC, a message authentication code similar to LightMAC. We consider a heuristic instantiation of EliMAC with roundreduced AES, and argue that this instantiation of EliMAC is much more efficient than LightMAC, it is around 21% faster, and additionally allows for precomputation of the keys, albeit with a stronger assumption on the AES primitive than in LightMAC. These observations are backed up with an implementation of our scheme.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"2004 1","pages":"69-93"},"PeriodicalIF":3.5,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86238514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP 用MILP增强ChaCha7的微分线性密码分析
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-16 DOI: 10.46586/tosc.v2023.i2.189-223
E. Bellini, David Gérault, J. Grados, R. Makarim, Thomas Peyrin
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a larger search space, including 2-bit differences (besides 1-bit differences) for the difference at the beginning of the differential part of the differential-linear trail; b) a better choice of mask between the differential and linear parts; c) a carefully crafted MILP tool that finds linear trails with higher correlation for the linear part. We eventually obtain a new distinguisher for ChaCha reduced to 7 rounds that requires 2166.89 computations, improving the previous record (ASIACRYPT 2022) by a factor of 247. Also, we obtain a distinguisher for ChaCha reduced to 7.5 rounds that requires 2251.4 computations, being the first time of a distinguisher against ChaCha reduced to 7.5 rounds. Using our MILP tool, we also found a 5-round differential-linear distinguisher. When combined with the probabilistic neutral bits (PNB) framework, we obtain a key-recovery attack on ChaCha reduced to 7 rounds with a computational complexity of 2206.8, improving by a factor 214.2 upon the recent result published at EUROCRYPT 2022.
本文提出了一种改进的差分-线性查码流密码分析方法。我们的主要贡献是新的微分-线性区分器,我们能够建立得益于以下改进:a)我们考虑了更大的搜索空间,包括2位差异(除了1位差异),用于微分-线性轨迹的微分部分开始的差异;B)在差动部分和线性部分之间更好地选择掩模;c)精心制作的MILP工具,可以找到线性部分具有较高相关性的线性轨迹。我们最终获得了一个新的ChaCha区分器,减少到7轮,需要2166.89次计算,将之前的记录(ASIACRYPT 2022)提高了247倍。此外,我们获得了一个ChaCha区分器,减少到7.5轮,需要2251.4次计算,这是ChaCha区分器的第一次减少到7.5轮。使用我们的MILP工具,我们还发现了一个5轮微分-线性区分器。当与概率中性比特(PNB)框架相结合时,我们获得了对ChaCha的密钥恢复攻击减少到7轮,计算复杂度为2206.8,比最近在EUROCRYPT 2022上发表的结果提高了214.2倍。
{"title":"Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP","authors":"E. Bellini, David Gérault, J. Grados, R. Makarim, Thomas Peyrin","doi":"10.46586/tosc.v2023.i2.189-223","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i2.189-223","url":null,"abstract":"In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a larger search space, including 2-bit differences (besides 1-bit differences) for the difference at the beginning of the differential part of the differential-linear trail; b) a better choice of mask between the differential and linear parts; c) a carefully crafted MILP tool that finds linear trails with higher correlation for the linear part. We eventually obtain a new distinguisher for ChaCha reduced to 7 rounds that requires 2166.89 computations, improving the previous record (ASIACRYPT 2022) by a factor of 247. Also, we obtain a distinguisher for ChaCha reduced to 7.5 rounds that requires 2251.4 computations, being the first time of a distinguisher against ChaCha reduced to 7.5 rounds. Using our MILP tool, we also found a 5-round differential-linear distinguisher. When combined with the probabilistic neutral bits (PNB) framework, we obtain a key-recovery attack on ChaCha reduced to 7 rounds with a computational complexity of 2206.8, improving by a factor 214.2 upon the recent result published at EUROCRYPT 2022.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"109 1","pages":"189-223"},"PeriodicalIF":3.5,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80876931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper) 卫星辅助下ARX密码回飞棒区分符的自动检索(长论文)
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-03-10 DOI: 10.46586/tosc.v2023.i1.152-191
Dachao Wang, Baocang Wang, Siwei Sun
In Addition-Rotation-Xor (ARX) ciphers, the large domain size obstructs the application of the boomerang connectivity table. In this paper, we explore the problem of computing this table for a modular addition and the automatic search of boomerang characteristics for ARX ciphers. We provide dynamic programming algorithms to efficiently compute this table and its variants. These algorithms are the most efficient up to now. For the boomerang connectivity table, the execution time is 42(n − 1) simple operations while the previous algorithm costs 82(n − 1) simple operations, which generates a smaller model in the searching phase. After rewriting these algorithms with boolean expressions, we construct the corresponding Boolean Satisfiability Problem models. Two automatic search frameworks are also proposed based on these models. This is the first time bringing the SAT-aided automatic search techniques into finding boomerang attacks on ARX ciphers. Finally, under these frameworks, we find out the first verifiable 10-round boomerang trail for SPECK32/64 with probability 2−29.15 and a 12-round trail for SPECK48/72 with probability 2−44.15. These are the best distinguishers for them so far. We also perceive that the previous boomerang attacks on LEA are constructed with an incorrect computation of the boomerang connection probability. The result is then fixed by our frameworks.
在ARX (Addition-Rotation-Xor)密码中,域尺寸过大阻碍了回飞镖连通性表的应用。在本文中,我们探讨了ARX密码的模加法表的计算问题和回飞棒特征的自动搜索问题。我们提供了动态规划算法来有效地计算该表及其变体。这些算法是目前最有效的。对于回飞镖连通性表,执行时间为42(n−1)个简单操作,而之前的算法执行时间为82(n−1)个简单操作,在搜索阶段生成的模型较小。在用布尔表达式重写这些算法之后,我们构造了相应的布尔可满足性问题模型。在此基础上提出了两种自动搜索框架。这是首次将卫星辅助自动搜索技术用于查找针对ARX密码的回旋镖攻击。最后,在这些框架下,我们找到了SPECK32/64的第一个可验证的10轮回旋轨迹,概率为2−29.15,以及SPECK48/72的12轮回旋轨迹,概率为2−44.15。这是迄今为止他们最好的区别。我们还发现,先前针对LEA的回飞镖攻击是在错误地计算回飞镖连接概率的基础上构建的。结果由我们的框架修复。
{"title":"SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper)","authors":"Dachao Wang, Baocang Wang, Siwei Sun","doi":"10.46586/tosc.v2023.i1.152-191","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i1.152-191","url":null,"abstract":"In Addition-Rotation-Xor (ARX) ciphers, the large domain size obstructs the application of the boomerang connectivity table. In this paper, we explore the problem of computing this table for a modular addition and the automatic search of boomerang characteristics for ARX ciphers. We provide dynamic programming algorithms to efficiently compute this table and its variants. These algorithms are the most efficient up to now. For the boomerang connectivity table, the execution time is 42(n − 1) simple operations while the previous algorithm costs 82(n − 1) simple operations, which generates a smaller model in the searching phase. After rewriting these algorithms with boolean expressions, we construct the corresponding Boolean Satisfiability Problem models. Two automatic search frameworks are also proposed based on these models. This is the first time bringing the SAT-aided automatic search techniques into finding boomerang attacks on ARX ciphers. Finally, under these frameworks, we find out the first verifiable 10-round boomerang trail for SPECK32/64 with probability 2−29.15 and a 12-round trail for SPECK48/72 with probability 2−44.15. These are the best distinguishers for them so far. We also perceive that the previous boomerang attacks on LEA are constructed with an incorrect computation of the boomerang connection probability. The result is then fixed by our frameworks.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"16 1","pages":"152-191"},"PeriodicalIF":3.5,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81856453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tight Multi-User Security Bound of sfDbHtS sfDbHtS的严格多用户安全约束
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-03-10 DOI: 10.46586/tosc.v2023.i1.192-223
N. Datta, Avijit Dutta, M. Nandi, Suprita Talnikar
In CRYPTO’21, Shen et al. proved that Two-Keyed-DbHtS construction is secure up to 22n/3 queries in the multi-user setting independent of the number of users. Here the underlying double-block hash function H of the construction realized as the concatenation of two independent n-bit keyed hash functions (HKh,1,HKh,2), and the security holds under the assumption that each of the n-bit keyed hash function is universal and regular. The authors have also demonstrated the applicability of their result to the key-reduced variants of DbHtS MACs, including 2K-SUM-ECBC, 2K-PMAC_Plus and 2K-LightMAC_Plus without requiring domain separation technique and proved 2n/3-bit multi-user security of these constructions in the ideal cipher model. Recently, Guo and Wang have invalidated the security claim of Shen et al.’s result by exhibiting three constructions, which are instantiations of the Two-Keyed-DbHtS framework, such that each of their n-bit keyed hash functions are O(2−n) universal and regular, while the constructions themselves are secure only up to the birthday bound. In this work, we show a sufficient condition on the underlying Double-block Hash (DbH) function, under which we prove an improved 3n/4-bit multi-user security of the Two-Keyed-DbHtS construction in the ideal-cipher model. To be more precise, we show that if each of the n-bit keyed hash function is universal, regular, and cross-collision resistant then it achieves the desired security. As an instantiation, we show that two-keyed Polyhash-based DbHtS construction is multi-user secure up to 23n/4 queries in the ideal-cipher model. Furthermore, due to the generic attack on DbHtS constructions by Leurent et al. in CRYPTO’18, our derived bound for the construction is tight.
在CRYPTO ' 21中,Shen等人证明了在独立于用户数的多用户设置下,双钥dbhts结构的安全性高达22n/3次查询。这里底层的双块哈希函数H是由两个独立的n位键哈希函数(HKh,1,HKh,2)串联而成的,安全性是在假设每个n位键哈希函数都是通用规则的前提下成立的。作者还证明了他们的结果适用于DbHtS mac的减密变体,包括2K-SUM-ECBC, 2K-PMAC_Plus和2K-LightMAC_Plus,而不需要域分离技术,并证明了这些结构在理想密码模型中的2n/3位多用户安全性。最近,Guo和Wang通过展示三种结构来否定Shen等人的结果的安全性声明,这三种结构是Two-Keyed-DbHtS框架的实例化,使得它们的每个n位密钥哈希函数都是O(2−n)全称和正则的,而结构本身仅在生日界内是安全的。本文给出了双块哈希(Double-block Hash, DbH)函数的一个充分条件,在此条件下,我们证明了理想密码模型中双密钥dbhts构造的3n/4位多用户安全性的改进。更准确地说,如果每个n位密钥哈希函数都是通用的、规则的和抗交叉碰撞的,那么它就达到了期望的安全性。作为一个实例,我们证明了在理想密码模型中,基于多哈希的双密钥DbHtS结构在查询次数高达23n/4的情况下是多用户安全的。此外,由于Leurent等人在CRYPTO ' 18中对DbHtS结构的通用攻击,我们的构造派生界很紧。
{"title":"Tight Multi-User Security Bound of sfDbHtS","authors":"N. Datta, Avijit Dutta, M. Nandi, Suprita Talnikar","doi":"10.46586/tosc.v2023.i1.192-223","DOIUrl":"https://doi.org/10.46586/tosc.v2023.i1.192-223","url":null,"abstract":"In CRYPTO’21, Shen et al. proved that Two-Keyed-DbHtS construction is secure up to 22n/3 queries in the multi-user setting independent of the number of users. Here the underlying double-block hash function H of the construction realized as the concatenation of two independent n-bit keyed hash functions (HKh,1,HKh,2), and the security holds under the assumption that each of the n-bit keyed hash function is universal and regular. The authors have also demonstrated the applicability of their result to the key-reduced variants of DbHtS MACs, including 2K-SUM-ECBC, 2K-PMAC_Plus and 2K-LightMAC_Plus without requiring domain separation technique and proved 2n/3-bit multi-user security of these constructions in the ideal cipher model. Recently, Guo and Wang have invalidated the security claim of Shen et al.’s result by exhibiting three constructions, which are instantiations of the Two-Keyed-DbHtS framework, such that each of their n-bit keyed hash functions are O(2−n) universal and regular, while the constructions themselves are secure only up to the birthday bound. In this work, we show a sufficient condition on the underlying Double-block Hash (DbH) function, under which we prove an improved 3n/4-bit multi-user security of the Two-Keyed-DbHtS construction in the ideal-cipher model. To be more precise, we show that if each of the n-bit keyed hash function is universal, regular, and cross-collision resistant then it achieves the desired security. As an instantiation, we show that two-keyed Polyhash-based DbHtS construction is multi-user secure up to 23n/4 queries in the ideal-cipher model. Furthermore, due to the generic attack on DbHtS constructions by Leurent et al. in CRYPTO’18, our derived bound for the construction is tight.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"114 1","pages":"192-223"},"PeriodicalIF":3.5,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87625242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
IACR Transactions on Symmetric Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1