Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2023, Vol. 17 Issue (4) : 174807    https://doi.org/10.1007/s11704-022-1466-1
RESEARCH ARTICLE
Universal tweakable Even-Mansour cipher and its applications
Ping ZHANG()
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
 Download: PDF(3848 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

The construction of the tweakable Even-Mansour cipher is in fact the designs of permutations, mask operations, and masking functions. For information-theoretic security, permutations are usually taken as random permutations. This paper focuses on the mask operations and masking functions to construct a universal tweakable Even-Mansour cipher. Firstly, we describe a formal definition of a universal masking function and provide a universal tweakable Even-Mansour cipher UTEM. In the random permutation model, we prove that UTEM is multi-key secure by H-coefficients technique. Then we show some efficient instantiations of the universal masking function to concertize UTEM. Finally, we apply UTEM to an encryption mode TIE (tweak incrementation encryption) and an authenticated encryption mode IAPM (integrity aware parallelizable mode), present two new schemes TIE-plus and IAPM-plus, and prove their security. UTEM enriches tweakable blockciphers, brings more research topics, and plays an important role in modes of operation, which will be of great significance.

Keywords tweakable Even-Mansour cipher      masking function      multi-key security      H-coefficients technique      encryption      authenticated encryption     
Corresponding Author(s): Ping ZHANG   
Just Accepted Date: 23 June 2022   Issue Date: 02 December 2022
 Cite this article:   
Ping ZHANG. Universal tweakable Even-Mansour cipher and its applications[J]. Front. Comput. Sci., 2023, 17(4): 174807.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-022-1466-1
https://academic.hep.com.cn/fcs/EN/Y2023/V17/I4/174807
Symbols or variables Descriptions
K Key space
Γ Tweak space
N Nonce space
M Plaintext space
C Ciphertext space
T Tag space
{0,1}? Set of all finite bit strings
xy or xy Concatenation of finite strings x and y
|x| Bit length of a finite string x
xX An element x randomly drawn from X
|X| The number of elements in a set X
GF(2n) Finite field with 2n elements
? Binary operation over GF(2n)
? Inverse operation of ?
Pr[E] Probability that an event E occurs
Perm(n) Set of all n-bit permutations
Tab.1  Descriptions of symbols or variables
Fig.1  UTEM: A universal tweakable Even-Mansour cipher
Fig.2  Multi-key security model of UTEM
Fig.3  TIE-plus: a new tweak incrementation encryption mode
  
  
Fig.4  IAPM-plus: a new permutation-based tweakable AE mode
  
  
  
1 Qiao C, Brown K N, Zhang F, Tian Z. Federated adaptive asynchronous clustering algorithm for wireless mesh networks. IEEE Transactions on Knowledge and Data Engineering, 2021, DOI:
2 M, Shafiq Z, Tian A K, Bashir X, Du M Guizani . CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet of Things Journal, 2021, 8( 5): 3242–3254
3 Lu H, Jin C, Helu X, Du X, Guizani M, Tian Z. DeepAutoD: research on distributed machine learning oriented scalable mobile communication security unpacking system. IEEE Transactions on Network Science and Engineering, 2021, DOI:
4 C, Luo Z, Tan G, Min J, Gan W, Shi Z Tian . A novel web attack detection system for internet of things via ensemble classification. IEEE Transactions on Industrial Informatics, 2021, 17( 8): 5810–5818
5 J, Qiu Y, Chai Z, Tian X, Du M Guizani . Automatic concept extraction based on semantic graphs from big data in smart city. IEEE Transactions on Computational Social Systems, 2020, 7( 1): 225–233
6 Liskov M, Rivest R L, Wagner D. Tweakable block ciphers. In: Proceedings of the 22nd Annual International Cryptology Conference. 2002, 31–46
7 S, Halevi P Rogaway . A tweakable enciphering mode. In: Proceedings of the 23rd Annual International Cryptology Conference. 2003, 482–499
8 S, Halevi P Rogaway . A parallelizable enciphering mode. In: Proceedings of Cryptographers’ Track at the RSA Conference. 2004, 292–304
9 P, Rogaway H Zhang . Online ciphers from tweakable blockciphers. In: Proceedings of Cryptographers’ Track at the RSA Conference 2011. 2011, 237–249
10 A, Chakraborti M, Nandi S, Talnikar K Yasuda . On the composition of single-keyed tweakable even-mansour for achieving BBB security. IACR Transactions on Symmetric Cryptology, 2020, 2020( 2): 1–39
11 P Rogaway . Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Proceedings of the 10th International Conference on the Theory and Application of Cryptology and Information Security. 2004, 16–31
12 D, Chakraborty P Sarkar . A general construction of tweakable block ciphers and different modes of operations. IEEE Transactions on Information Theory, 2008, 54( 5): 1991–2006
13 W, Landecker T, Shrimpton R S Terashima . Tweakable blockciphers with beyond birthday-bound security. In: Proceedings of the 32nd Annual Cryptology Conference. 2012, 14–30
14 T, Krovetz P Rogaway . The software performance of authenticated-encryption modes. In: Proceedings of the 18th International Workshop on Fast Software Encryption. 2011, 306–327
15 E, Andreeva A, Bogdanov A, Luykx B, Mennink E, Tischhauser K Yasuda . Parallelizable and authenticated online ciphers. In: Proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information Security. 2013, 424–443
16 R, Granger P, Jovanovic B, Mennink S Neves . Improved masking for tweakable blockciphers with applications to authenticated encryption. In: Proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2016, 263–293
17 L, Bossuet N, Datta C, Mancillas-López M Nandi . ELmD: a pipelineable authenticated encryption and its hardware implementation. IEEE Transactions on Computers, 2016, 65( 11): 3318–3331
18 T, Peyrin Y Seurin . Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 33–63
19 Y Naito . Tweakable blockciphers for efficient authenticated encryptions with beyond the birthday-bound security. IACR Transactions on Symmetric Cryptology, 2017, 2017( 2): 1–26
20 Z, Bao J, Guo T, Iwata K Minematsu . ZOCB and ZOTR: tweakable blockcipher modes for authenticated encryption with full absorption. IACR Transactions on Symmetric Cryptology, 2019, 2019( 2): 1–54
21 Y, Naito T Sugawara . Lightweight authenticated encryption mode of operation for tweakable block ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020( 1): 66–94
22 Y, Naito Y, Sasaki T Sugawara . Lightweight authenticated encryption mode suitable for threshold implementation. In: Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2020, 705–735
23 B, Cogliati R, Lampe Y Seurin . Tweaking even-mansour ciphers. In: Proceedings of the 35th Annual Cryptology Conference. 2015, 189–208
24 Cogliati B, Seurin Y. Beyond-birthday-bound security for tweakable even-mansour ciphers with linear tweak and key mixing. In: Proceedings of the 21st International Conference on the Theory and Application of Cryptology and Information Security. 2015, 134–158
25 B Mennink . XPX: generalized tweakable even-mansour with improved security guarantees. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 64–94
26 R, Reyhanitabar S, Vaudenay D Vizár . Misuse-resistant variants of the OMD authenticated encryption mode. In: Proceedings of the 8th International Conference on Provable Security. 2014, 55–70
27 R, Reyhanitabar S, Vaudenay D Vizár . Boosting OMD for almost free authentication of associated data. In: Proceedings of the 22nd International Workshop on Fast Software Encryption. 2015, 411–427
28 J, Jean I, Nikolić T Peyrin . Tweaks and keys for block ciphers: the TWEAKEY framework. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security. 2014, 274–288
29 E Biham . New types of cryptanalytic attacks using related keys. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques Lofthus. 1993, 398–409
30 E Biham . New types of cryptanalytic attacks using related keys. Journal of Cryptology, 1994, 7( 4): 229–246
31 M, Bellare T Kohno . A theoretical treatment of related-key attacks: rka-prps, rka-prfs, and applications. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2003, 491–506
32 P, Zhang H-G Hu . Generalized tweakable even-mansour cipher and its applications. Journal of Computer Science and Technology, 2018, 33( 6): 1261–1277
33 P A, Fouque A, Joux C Mavromati . Multi-user collisions: applications to discrete logarithm, even-mansour and PRINCE. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security. 2014, 420–438
34 N, Mouha A Luykx . Multi-key security: the even-mansour construction revisited. In: Proceedings of the 35th Annual Cryptology Conference. 2015, 209–223
35 M, Bellare B Tackmann . The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 247–276
36 V T, Hoang S Tessaro . Key-alternating ciphers and key-length extension: exact bounds and multi-user security. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 3–32
37 Z, Guo W, Wu R, Liu L Zhang . Multi-key analysis of tweakable even-mansour with applications to minalpher and OPP. IACR Transactions on Symmetric Cryptology, 2017, 2016( 2): 288–306
38 P, Zhang Q, Yuan H, Hu P Wang . Multi-user security of the tweakable Even-Mansour cipher. Science China Information Sciences, 2021, 64( 3): 139102
39 A Dutta . Minimizing the two-round tweakable Even-Mansour cipher. In: Proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security. 2020, 601–629
40 H, Kim Y, Lee J Lee . Forking tweakable Even-Mansour ciphers. IACR Transactions on Symmetric Cryptology, 2020, 2020( 4): 71–87
41 C S Jutla . Encryption modes with almost free message integrity. Journal of Cryptology, 2008, 21( 4): 547–578
42 J Patarin . The “coefficients H” technique. In: Proceedings of the 15th International Conference on Selected Areas in Cryptography. 2008, 328–345
43 P, Rogaway M, Bellare J Black . OCB: a block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security, 2003, 6( 3): 365–403
44 K Kurosawa . Power of a public random permutation and its application to authenticated encryption. IEEE Transactions on Information Theory, 2010, 56( 10): 5366–5374
45 H, Kuwakado M Morii . Security on the quantum-type Even-Mansour cipher. In: Proceedings of 2012 International Symposium on Information Theory and its Applications. 2012, 312–316
46 P, Crowley E Biggers . Adiantum: length-preserving encryption for entry-level processors. IACR Transactions on Symmetric Cryptology, 2018, 2018( 4): 39–61
47 J Hastad . The security of the IAPM and IACBC modes. Journal of Cryptology, 2007, 20( 2): 153–163
48 A, Hosoyamada T Iwata . Provably quantum-secure tweakable block ciphers. IACR Transactions on Symmetric Cryptology, 2021, 2021( 1): 337–377
[1] FCS-21466-OF-PZ_suppl_1 Download
[1] Jianwei LI, Xiaoming WANG, Qingqing GAN. SEOT: Secure dynamic searchable encryption with outsourced ownership transfer[J]. Front. Comput. Sci., 2023, 17(5): 175812-.
[2] Yunbo YANG, Xiaolei DONG, Zhenfu CAO, Jiachen SHEN, Shangmin DOU. IXT: Improved searchable encryption for multi-word queries based on PSI[J]. Front. Comput. Sci., 2023, 17(5): 175811-.
[3] Xiaoling HUANG, Youxia DONG, Guodong YE, Yang SHI. Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform[J]. Front. Comput. Sci., 2023, 17(3): 173804-.
[4] Qingqing GAN, Joseph K. LIU, Xiaoming WANG, Xingliang YUAN, Shi-Feng SUN, Daxin HUANG, Cong ZUO, Jianfeng WANG. Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage[J]. Front. Comput. Sci., 2022, 16(6): 166820-.
[5] Bowen ZHAO, Shaohua TANG, Ximeng LIU, Yiming WU. Return just your search: privacy-preserving homoglyph search for arbitrary languages[J]. Front. Comput. Sci., 2022, 16(2): 162801-.
[6] Shijun XIANG, Guanqi RUAN, Hao LI, Jiayong HE. Robust watermarking of databases in order-preserving encrypted domain[J]. Front. Comput. Sci., 2022, 16(2): 162804-.
[7] Zhangjie FU, Yan WANG, Xingming SUN, Xiaosong ZHANG. Semantic and secure search over encrypted outsourcing cloud based on BERT[J]. Front. Comput. Sci., 2022, 16(2): 162802-.
[8] Fei MENG, Leixiao CHENG, Mingqiang WANG. ABDKS: attribute-based encryption with dynamic keyword search in fog computing[J]. Front. Comput. Sci., 2021, 15(5): 155810-.
[9] Yanwei ZHOU, Bo YANG. Practical continuous leakage-resilient CCA secure identity-based encryption[J]. Front. Comput. Sci., 2020, 14(4): 144804-.
[10] Sa WANG, Yiwen SHAO, Yungang BAO. Practices of backuping homomorphically encrypted databases[J]. Front. Comput. Sci., 2019, 13(2): 220-230.
[11] Xiaochun CAO,Meili MA,Xiaojie GUO,Ling DU,Dongdai LIN. A new encryption scheme for surveillance videos[J]. Front. Comput. Sci., 2015, 9(5): 765-777.
[12] Mingming JIANG,Yupu HU,Hao LEI,Baocang WANG,Qiqi LAI. Lattice-based certificateless encryption scheme[J]. Front. Comput. Sci., 2014, 8(5): 828-836.
[13] Mingwu ZHANG,Yi MU. Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks[J]. Front. Comput. Sci., 2014, 8(3): 456-468.
[14] Qiqi LAI,Yuan CHEN,Yupu HU,Baocang WANG,Mingming JIANG. Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model[J]. Front. Comput. Sci., 2014, 8(3): 469-477.
[15] Haibo TIAN,Jin LI. A short non-delegatable strong designated verifier signature[J]. Front. Comput. Sci., 2014, 8(3): 490-502.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed