Tweaks and keys for block ciphers: the tweakey framework. We propose the tweakey framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with arbitrary tweak and key sizes, given the public round permutation (for instance, the aes round). Increasing the sizes renders the security analysis very difficult and thus we identify a subclass of tweakey, that we name stk, which solves the size issue by the use of finite field multiplications on low hamming weight constants. Overall, this construction allows a significant increase of security of well-known authenticated encryptions mode like Θcb3 from birthday-bound security to full security, where a regular block cipher was used as a black box to build a tweakable block cipher. Our work can also be seen as advances on the topic of secure key schedule design.

References in zbMATH (referenced in 24 articles , 1 standard article )

Showing results 1 to 20 of 24.
Sorted by year (citations)

1 2 next

  1. Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick: The \textttDeoxysAEAD family (2021)
  2. Mennink, Bart; Neves, Samuel: On the resilience of Even-Mansour to invariant permutations (2021)
  3. Jha, Ashwin; Nandi, Mridul: Tight security of cascaded LRW2 (2020)
  4. Zhao, Boxin; Dong, Xiaoyang; Meier, Willi; Jia, Keting; Wang, Gaoli: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (2020)
  5. Li, Rongjia; Jin, Chenhui; Pan, Hongchen: Key recovery attacks on reduced-round Joltik-BC in the single-key setting (2019)
  6. Cogliati, Benoît: Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (2018)
  7. Forler, Christian; List, Eik; Lucks, Stefan; Wenzel, Jakob: \textscPOEx: a beyond-birthday-bound-secure on-line cipher (2018)
  8. Lee, Jooyoung; Luykx, Atul; Mennink, Bart; Minematsu, Kazuhiko: Connecting tweakable and multi-key blockcipher security (2018)
  9. Chang, Donghoon; Ghosh, Mohona; Gupta, Kishan Chand; Jati, Arpan; Kumar, Abhishek; Moon, Dukjae; Ray, Indranil Ghosh; Sanadhya, Somitra Kumar: SPF: a new family of efficient format-preserving encryption algorithms (2017)
  10. Dobraunig, Christoph; List, Eik: Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC (2017)
  11. Tolba, Mohamed; Abdelkhalek, Ahmed; Youssef, Amr M.: Impossible differential cryptanalysis of reduced-round \textttSKINNY (2017)
  12. Zheng, Yafei; Wu, Wenling: Biclique attack of block cipher \textttSKINNY (2017)
  13. Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng: The (\mathttSKINNY) family of block ciphers and its low-latency variant (\mathttMANTIS) (2016)
  14. Dobraunig, Christoph; Eichlseder, Maria; Korak, Thomas; Lomné, Victor; Mendel, Florian: Statistical fault attacks on nonce-based authenticated encryption schemes (2016)
  15. Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian: Square attack on 7-round Kiasu-BC (2016)
  16. Forler, Christian; List, Eik; Lucks, Stefan; Wenzel, Jakob: Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch (2016)
  17. Fouque, Pierre-Alain; Karpman, Pierre; Kirchner, Paul; Minaud, Brice: Efficient and provable white-box primitives (2016)
  18. Jean, Jérémy; Sasaki, Yu; Wang, Lei: Analysis of the CAESAR candidate silver (2016)
  19. Minematsu, Kazuhiko: Authenticated encryption with small stretch (or, how to accelerate AERO) (2016)
  20. Vizár, Damian: The state of the authenticated encryption (2016)

1 2 next