Browse > Article
http://dx.doi.org/10.33778/kcsa.2020.20.1.009

Analysis of Variants of the Even-Mansour scheme  

Kim, HongTae (공군사관학교/수학과)
Publication Information
Abstract
There have been many papers on minimalism of cryptography. Secure minimal block cipher is one of these topics and Even and Mansour suggested a simple block cipher. The Even-Mansour scheme is a block cipher with one permutation and two whitening keys. Studying related to the Even-Mansour scheme gives great insight into the security and design of block cipher. There have been suggested many trials to analyze the security of the Even-Mansour scheme and variants of the Even-Mansour scheme. We present a new variant of the Even-Mansour scheme and introduce a variant of the Even-Mansour scheme. We focus on the security of these variants of the Even-Mansour scheme and present variation of the security according to key size. We prove the security of a variant of the Even-Mansour scheme and show that a generalized Even-Mansour scheme is not proper for a minimal block cipher.
Keywords
Minimalism; Analysis; Even-Mansour scheme; Block cipher; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Bogdanov, L. R. Knudsen, G. Leander, F. Standaert, J. Steinberger and E. Tischhauser, "Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations", Proceedings of EUROCRYPT 2012, LNCS Vol. 7237, pp. 45-62, 2012.
2 A. Biryukov and D. Wagner, "Advanced Slide Attacks", Proceedings of EUROCRYPT 2000, LNCS Vol. 1807, pp. 589-606, 2000.
3 S. Chen, R. Lampe, J. Lee, Y. Seurin and J. P. Steinberger, "Minimizing the tworound Even-Mansour cipher", Proceedings of CRYPTO 2014, LNCS Vol. 8616, pp. 39-56, 2014.
4 S. Chen and J. P. Steinberger, "Tight Security Bounds for Key-Alternating Ciphers", Proceedings of EUROCRYPT 2014, LNCS Vol. 8441, pp. 327-350, 2014.
5 J. Daemen, "Limitations of the Even-Mansour Construction", Proceedings of ASIACRYPT 1991, LNCS Vol. 739, pp. 495-498, 1993.
6 I. Dinur, O. Dunkelman, N. Keller and A. Shamir, " Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2", Proceedings of ASIACRYPT 2013, LNCS Vol. 8269, pp. 337-356, 2013.
7 I. Dinur, O. Dunkelman, N. Keller and A. Shamir, "Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys", Proceedings of ASIACRYPT 2014, LNCS Vol. 8873, pp. 439-457, 2014.
8 O. Dunkelman, N. Keller and A. Shamir, "Minimalism in Cryptography: The Even-Mansour Scheme Revisited", Proceedings of EUROCRYPT 2012, LNCS Vol. 7237, pp. 336-354, 2012.
9 Y. Dai, J. Lee, B. Mennink and J. P. Steinberger, "The Security of Multiple Encryption in the Ideal Cipher Model", Proceedings of CRYPTO 2014, LNCS Vol. 8616, pp. 20-38, 2014.
10 S. Even and Y. Mansour, "A Construction of a Cipher From a Single Pseudorandom Permutation", Proceedings of ASIACRYPT 1991, LNCS Vol. 739, pp. 210-224, 1993.
11 A. Biryukov, C. De Canniere, A. Braeken and B. Preneel, "A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms", Proceedings of EUROCRYPT 2003, LNCS Vol. 2656, pp. 33-50, 2003.
12 S. Even and Y. Mansour, "A Construction of a Cipher from a Single Pseudorandom Permutation", Journal of Cryptology 10(3), pp. 151-162, 1997.   DOI
13 P. Gazi and S. Tessaro, "Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading", Proceedings of EUROCRYPT 2012, LNCS Vol. 7237, pp. 63-80, 2012.
14 H. Kim, "Simplification on Even-Mansour Scheme Attacks", Journal of Information and Security, Vol. 16, No. 7, pp. 85-91, 2016.
15 S. Noh, "A Study of DES(Data Encryption Standard) Property, Diagnosis and How to Apply Enhanced Symmetric Key Encryption Algorithm", Journal of Information and Security, Vol. 12, No. 4, pp. 85-90, 2012.
16 E. Andreeva, A. Bogdanov, Y. Dodis, B. Mennink and J. P. Steinberger, "On the Indifferentiability of Key-Alternating Ciphers", Proceedings of CRYPTO 2013, LNCS Vol. 8042, pp. 531-550, 2013.