期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Generalized Tweakable Even-Mansour Cipher and Its Applications
1
作者 Ping Zhang Hong-Gang Hu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第6期1261-1277,共17页
This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based ona public random permutation P and a family of almost-XOR-universal hash functions H={HK}K∈κ as a tweak and key... This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based ona public random permutation P and a family of almost-XOR-universal hash functions H={HK}K∈κ as a tweak and keyschedule, and defined as y = HPHK((t1, t2), x) = P(x HK(t1)) HK(t2), where K is a key randomly chosen from a keyspace/C, (tl, t2) is a tweak chosen from a valid tweak space T, x is a plaintext, and y is a ciphertext. We prove that HPHis a secure strong tweakable pseudorandom permutation (STPRP) by using H-coefficients technique. Then we focus on thesecurity of HPH against multi-key and related-key attacks. We prove that HPH achieves both multi-key STPRP security andrelated-key STPRP security. HPH can be extended to wide applications. It can be directly applied to authentication andauthenticated encryption modes. We apply HPH to PMAC1 and OPP, provide an improved authentication mode HPMACand a new authenticated encryption mode OPH, and prove that the two modes achieve single-key security, multi-key security,and related-key security. 展开更多
关键词 tweakable blockcipher H-coefficients technique AUTHENTICATION authenticated ENCRYPTION provable security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部