DOI: 10.1007/978-3-540-75496-1_6
|View full text |Cite
|
Sign up to set email alerts
|

The Security of Elastic Block Ciphers Against Key-Recovery Attacks

Abstract: Abstract.We analyze the security of elastic block ciphers against key-recovery attacks. An elastic version of a fixed-length block cipher is a variable-length block cipher that supports any block size in the range of one to two times the length of the original block. Our method for creating an elastic block cipher involves inserting the round function of the original cipher into a substitution-permutation network. In this paper, we form a polynomial-time reduction between the elastic and original versions of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Publication Types

Select...
2
1
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 10 publications
(13 reference statements)
0
5
0
Order By: Relevance
“…Our results assist in proving the soundness of the elastic block cipher's basic structure. The security of elastic block ciphers against practical attacks was evaluated in [3]. By proving the elastic network forms variable-length PRPs and SPRPs on inputs of b to 2b bits, under certain restrictions on the number of rounds and independence of the round functions as was done for Feistel networks [7,8], our work provides further justification for the elastic block cipher approach to creating variable-length block ciphers.…”
Section: Introductionmentioning
confidence: 95%
“…Our results assist in proving the soundness of the elastic block cipher's basic structure. The security of elastic block ciphers against practical attacks was evaluated in [3]. By proving the elastic network forms variable-length PRPs and SPRPs on inputs of b to 2b bits, under certain restrictions on the number of rounds and independence of the round functions as was done for Feistel networks [7,8], our work provides further justification for the elastic block cipher approach to creating variable-length block ciphers.…”
Section: Introductionmentioning
confidence: 95%
“…This work is an extended version of our previous work on elastic block ciphers, including a more detailed explanation for the selection of the basic structure utilized when creating elastic block ciphers, extended proofs of claims and extended descriptions of instantiations of the method from [11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Our analysis is independent of the key schedule. 4 The swap step is performed by selecting y consecutive bits from the round function's output to XOR and swap with the y bits left out of the round function. In the implementation of elastic AES, the starting position of the y bits selected rotates to the right one byte each round.…”
Section: Examplesmentioning
confidence: 99%
“…In [4] it was proven that an elastic version of a cipher is immune to any practical key-recovery attack if the original cipher is immune to the attack regardless of the specific bit positions chosen for the swap steps. Differential cryptanalysis is covered by this result.…”
Section: Examplesmentioning
confidence: 99%
See 1 more Smart Citation