1999
DOI: 10.1007/3-540-48519-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Towards Making Luby-Rackoff Ciphers Optimal and Practical

Abstract: Abstract. We provide new constructions for Luby-Rackoae block ciphers which are eaecient in terms of computations and key material used. Next, we show that we can make some security guarantees for Luby-Rackoae block ciphers under much w eaker and more practical assumptions about the underlying function; namely, that the underlying function is a secure Message Authentication Code. Finally, w e provide a SHA-1 based example block cipher called Sha-zam.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0
3

Year Published

2002
2002
2006
2006

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 29 publications
(33 citation statements)
references
References 10 publications
0
30
0
3
Order By: Relevance
“…The L-R construction inspired a considerable amount of research, see [7] for a summary of existing works on this topic. One direction of research is to use less than 4 different pseudo-random functions, or to use less than 4 calls to these functions in one encryption, see [7,11,16,17]. However in these papers the proven security is still m 2 n/2 .…”
Section: Introductionmentioning
confidence: 99%
“…The L-R construction inspired a considerable amount of research, see [7] for a summary of existing works on this topic. One direction of research is to use less than 4 different pseudo-random functions, or to use less than 4 calls to these functions in one encryption, see [7,11,16,17]. However in these papers the proven security is still m 2 n/2 .…”
Section: Introductionmentioning
confidence: 99%
“…Patel etc. further discussed the function of universal hash functions in the Feistel construction [20]. Bellare and Rogaway [1] used a special pseudorandom function and a special encryption mode to construct a variable-input-length cipher.…”
Section: Related Workmentioning
confidence: 99%
“…Another option of speeding up MTC4 is to follow the approach of [21,22] and require less computation in the first and last round functions. The following algorithm is a straightforward application of the ideas of Patel, et al [21] to MTC4.…”
Section: Reduced Manticore4 (Rmtc4)mentioning
confidence: 99%
“…The following algorithm is a straightforward application of the ideas of Patel, et al [21] to MTC4. Reduced Manticore4 (RMTC4) is a four-round Feistel construction, where the second and third round functions are cryptographic hash functions, but the first and last rounds are not.…”
Section: Reduced Manticore4 (Rmtc4)mentioning
confidence: 99%
See 1 more Smart Citation