Next Article in Journal
A Method for Constructing Supervised Topic Model Based on Term Frequency-Inverse Topic Frequency
Previous Article in Journal
Modified Advanced Encryption Standard Algorithm for Information Security
Previous Article in Special Issue
Randomness Analysis for the Generalized Self-Shrinking Sequences
Open AccessArticle

Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation

by Yasir Nawaz * and Lei Wang *
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
*
Authors to whom correspondence should be addressed.
Symmetry 2019, 11(12), 1485; https://doi.org/10.3390/sym11121485
Received: 3 November 2019 / Revised: 26 November 2019 / Accepted: 2 December 2019 / Published: 5 December 2019
(This article belongs to the Special Issue Interactions between Group Theory, Symmetry and Cryptology)
Designing a secure construction has always been a fascinating area for the researchers in the field of symmetric key cryptography. This research aimed to make contributions to the design of secure block cipher in the ideal cipher model whose underlying primitive is a family of n b i t to n b i t random permutations indexed by secret key. Our target construction of a secure block ciphers denoted as E [ s ] is built on a simple XOR operation and two block cipher invocations, under the assumptions that the block cipher in use is a pseudorandom permutation. One out of these two block cipher invocations produce a subkey that is derived from the secret key. It has been accepted that at least two block cipher invocations with XOR operations are required to achieve beyond birthday bound security. In this paper, we investigated the E [ s ] instances with the advanced proof technique and efficient block cipher constructions that bypass the birthday-bound up to 2 n provable security was achieved. Our study provided new insights to the block cipher that is beyond birthday bound security. View Full-Text
Keywords: pseudorandom permutation; block cipher; ideal cipher model; beyond birthday bound; provable security pseudorandom permutation; block cipher; ideal cipher model; beyond birthday bound; provable security
Show Figures

Figure 1

MDPI and ACS Style

Nawaz, Y.; Wang, L. Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation. Symmetry 2019, 11, 1485.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop