tweakey

Tweaks and keys for block ciphers: the tweakey framework. We propose the tweakey framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with arbitrary tweak and key sizes, given the public round permutation (for instance, the aes round). Increasing the sizes renders the security analysis very difficult and thus we identify a subclass of tweakey, that we name stk, which solves the size issue by the use of finite field multiplications on low hamming weight constants. Overall, this construction allows a significant increase of security of well-known authenticated encryptions mode like Θcb3 from birthday-bound security to full security, where a regular block cipher was used as a black box to build a tweakable block cipher. Our work can also be seen as advances on the topic of secure key schedule design.


References in zbMATH (referenced in 28 articles , 1 standard article )

Showing results 1 to 20 of 28.
Sorted by year (citations)

1 2 next

  1. Dong, Xiaoyang; Hua, Jialiang; Sun, Siwei; Li, Zheng; Wang, Xiaoyun; Hu, Lei: Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (2021)
  2. Dunkelman, Orr; Huang, Senyang; Lambooij, Eran; Perle, Stav: Biased differential distinguisher -- cryptanalysis of reduced-round \textscSKINNY (2021)
  3. Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick: The \textttDeoxysAEAD family (2021)
  4. Mennink, Bart; Neves, Samuel: On the resilience of Even-Mansour to invariant permutations (2021)
  5. Bao, Zhenzhen; Guo, Chun; Guo, Jian; Song, Ling: TNT: how to tweak a block cipher (2020)
  6. Jha, Ashwin; Nandi, Mridul: Tight security of cascaded LRW2 (2020)
  7. Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi: Lightweight authenticated encryption mode suitable for threshold implementation (2020)
  8. Zhao, Boxin; Dong, Xiaoyang; Meier, Willi; Jia, Keting; Wang, Gaoli: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (2020)
  9. Li, Rongjia; Jin, Chenhui; Pan, Hongchen: Key recovery attacks on reduced-round Joltik-BC in the single-key setting (2019)
  10. Cogliati, Benoît: Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (2018)
  11. Forler, Christian; List, Eik; Lucks, Stefan; Wenzel, Jakob: \textscPOEx: a beyond-birthday-bound-secure on-line cipher (2018)
  12. Lee, Jooyoung; Luykx, Atul; Mennink, Bart; Minematsu, Kazuhiko: Connecting tweakable and multi-key blockcipher security (2018)
  13. Chang, Donghoon; Ghosh, Mohona; Gupta, Kishan Chand; Jati, Arpan; Kumar, Abhishek; Moon, Dukjae; Ray, Indranil Ghosh; Sanadhya, Somitra Kumar: SPF: a new family of efficient format-preserving encryption algorithms (2017)
  14. Dobraunig, Christoph; List, Eik: Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC (2017)
  15. Tolba, Mohamed; Abdelkhalek, Ahmed; Youssef, Amr M.: Impossible differential cryptanalysis of reduced-round \textttSKINNY (2017)
  16. Zheng, Yafei; Wu, Wenling: Biclique attack of block cipher \textttSKINNY (2017)
  17. Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng: The (\mathttSKINNY) family of block ciphers and its low-latency variant (\mathttMANTIS) (2016)
  18. Dobraunig, Christoph; Eichlseder, Maria; Korak, Thomas; Lomné, Victor; Mendel, Florian: Statistical fault attacks on nonce-based authenticated encryption schemes (2016)
  19. Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian: Square attack on 7-round Kiasu-BC (2016)
  20. Forler, Christian; List, Eik; Lucks, Stefan; Wenzel, Jakob: Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch (2016)

1 2 next