2014
DOI: 10.1007/978-3-662-44371-2_2
|View full text |Cite
|
Sign up to set email alerts
|

The Security of Multiple Encryption in the Ideal Cipher Model

Abstract: Abstract. Multiple encryption-the practice of composing a blockcipher several times with itself under independent keys-has received considerable attention of late from the standpoint of provable security. Despite these efforts proving definitive security bounds (i.e., with matching attacks) has remained elusive even for the special case of triple encryption. In this paper we close the gap by improving both the best known attacks and best known provable security, so that both bounds match. Our results apply for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
10
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 28 publications
1
10
0
Order By: Relevance
“…We prove that cascades of odd length = 2r + 1 are secure whenever q c q r e 2 r(κ+n) , q c 2 κ , and q e 2 2κ . For κ and n satisfying κ ≥ rn r+1 , this improves on the security bound of Dai et al [9] when q c ≤ 2 rn r+1 . Moreover, when κ ≥ n, this yields a tight bound (matching Gaži's attack [12]) for all parameters (for κ ≤ n, the situation is more involved, see Section 5 for a complete discussion).…”
Section: Our Contributionsmentioning
confidence: 57%
See 3 more Smart Citations
“…We prove that cascades of odd length = 2r + 1 are secure whenever q c q r e 2 r(κ+n) , q c 2 κ , and q e 2 2κ . For κ and n satisfying κ ≥ rn r+1 , this improves on the security bound of Dai et al [9] when q c ≤ 2 rn r+1 . Moreover, when κ ≥ n, this yields a tight bound (matching Gaži's attack [12]) for all parameters (for κ ≤ n, the situation is more involved, see Section 5 for a complete discussion).…”
Section: Our Contributionsmentioning
confidence: 57%
“…This result was later generalized to arbitrary length by Gaži and Maurer [13]. Their bound on q e was however far from tight, and was first improved by Lee [18], and a tight bound (matching an attack by Gaži [12]) was only recently given by Dai, Lee, Mennink, and Steinberger [9].…”
Section: Plain and Randomized Cascadesmentioning
confidence: 98%
See 2 more Smart Citations
“…Lee [25] improved the right-hand side, showing a better bound approaching the optimal value of κ + min {κ, n} with increasing → ∞, however his result only gives useful bounds for large (say ≥ 16). A tight bound (matching the attacks mentioned below) was finally given by Dai, Lee, Mennink, and Steinberger [10], establishing the security of a cascade of length as long as q C ≤ 2 n and log(q P ) κ + min −2 2 · κ, −2 · n , where = 2 · /2 denotes the smallest even integer not smaller than .…”
Section: B Plain Cascadesmentioning
confidence: 97%