2017
DOI: 10.1007/978-3-319-63697-9_18
|View full text |Cite
|
Sign up to set email alerts
|

Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 42 publications
0
7
0
Order By: Relevance
“…Last, a series of papers analyzed idealized BCs in the indifferentiability framework, which is a different security model. Please see [19] and the references therein. Among them is a positive result [27] on a variant of KAF abstracted from NSA's cipher SIMON [4].…”
Section: Introductionmentioning
confidence: 99%
“…Last, a series of papers analyzed idealized BCs in the indifferentiability framework, which is a different security model. Please see [19] and the references therein. Among them is a positive result [27] on a variant of KAF abstracted from NSA's cipher SIMON [4].…”
Section: Introductionmentioning
confidence: 99%
“…One possibility would be the class of key-unpredictable, claw-free, and xkcd-secure CDF sets as shown in Theorem 1. Although feasibility of this level of security claim for iterated Even-Mansour ciphers would follow from known indifferentiability [LS13,DSST17], this would require a larger number of rounds and also comes at the cost of lower levels of security. It remains an interesting open question to find the minimal number of rounds needed in the Even-Mansour ciphers that yields (Ξ e , Ξ d )-KC-CCA security with respect to any pair (Ξ e , Ξ d ) for which the ideal cipher is also (Ξ e , Ξ d )-KC-CCA secure.…”
Section: ($ + P −mentioning
confidence: 99%
“…4 Thus, proving that a construction C is indifferentiable from an ideal object F amounts to proving that C f retains essentially all security properties implicit in F . This approach has been successfully applied to the analysis of many symmetric cryptographic constructions in various ideal-primitive models; see, e.g., [CDMP05,BDPV08,HKT11,DSSL16,DSST17]. Our work is motivated by this composition property.…”
Section: Background On Indifferentiabilitymentioning
confidence: 99%