期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Generalized Tweakable Even-Mansour Cipher and Its Applications
1
作者 Ping Zhang Hong-Gang Hu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第6期1261-1277,共17页
This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based ona public random permutation P and a family of almost-XOR-universal hash functions H={HK}K∈κ as a tweak and key... This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based ona public random permutation P and a family of almost-XOR-universal hash functions H={HK}K∈κ as a tweak and keyschedule, and defined as y = HPHK((t1, t2), x) = P(x HK(t1)) HK(t2), where K is a key randomly chosen from a keyspace/C, (tl, t2) is a tweak chosen from a valid tweak space T, x is a plaintext, and y is a ciphertext. We prove that HPHis a secure strong tweakable pseudorandom permutation (STPRP) by using H-coefficients technique. Then we focus on thesecurity of HPH against multi-key and related-key attacks. We prove that HPH achieves both multi-key STPRP security andrelated-key STPRP security. HPH can be extended to wide applications. It can be directly applied to authentication andauthenticated encryption modes. We apply HPH to PMAC1 and OPP, provide an improved authentication mode HPMACand a new authenticated encryption mode OPH, and prove that the two modes achieve single-key security, multi-key security,and related-key security. 展开更多
关键词 tweakable blockcipher h-coefficients technique AUTHENTICATION authenticated ENCRYPTION provable security
原文传递
Universal tweakable Even-Mansour cipher and its applications
2
作者 Ping ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第4期181-192,共12页
The construction of the tweakable Even-Mansour cipher is in fact the designs of permutations,mask operations,and masking functions.For information-theoretic security,permutations are usually taken as random permutatio... The construction of the tweakable Even-Mansour cipher is in fact the designs of permutations,mask operations,and masking functions.For information-theoretic security,permutations are usually taken as random permutations.This paper focuses on the mask operations and masking functions to construct a universal tweakable Even-Mansour cipher.Firstly,we describe a formal definition of a universal masking function and provide a universal tweakable Even-Mansour cipher UTEM.In the random permutation model,we prove that UTEM is multi-key secure by H-coefficients technique.Then we show some efficient instantiations of the universal masking function to concertize UTEM.Finally,we apply UTEM to an encryption mode TIE(tweak incrementation encryption)and an authenticated encryption mode IAPM(integrity aware parallelizable mode),present two new schemes TIE-plus and IAPM-plus,and prove their security.UTEM enriches tweakable blockciphers,brings more research topics,and plays an important role in modes of operation,which will be of great significance. 展开更多
关键词 tweakable Even-Mansour cipher masking function multi-key security h-coefficients technique ENCRYPTION authenticated encryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部