Tweakable Pseudorandom Permutation from Generalized Feistel Structure
スポンサーリンク
概要
- 論文の詳細を見る
Tweakable pseudorandom permutations have wide applications such as the disk sector encryption, and the underlying primitive for efficient MACs and authenticated encryption schemes. Goldenberg et al. showed constructions of a tweakable pseudorandom permutation based on the Feistel structure. In this paper, we explore the possibility of designing tweakable pseudorandom permutations based on the Generalized Feistel Structure. We show that tweakable pseudorandom permutations can be obtained without increasing the number of rounds compared to the non-tweakable versions. We also present designs that take multiple tweaks as input.
- (社)電子情報通信学会の論文
- 2010-01-01
著者
-
IWATA Tetsu
Department of Computer and Information Sciences, Ibaraki University
-
Iwata Tetsu
Department Of Computational Science And Engineering Nagoya University
-
MITSUDA Atsushi
Department of Computational Science and Engineering, Nagoya University
-
Mitsuda Atsushi
Department Of Computational Science And Engineering Nagoya University
関連論文
- On the Security of a MAC by Mitchell(Symmetric Key Cryptography)(Cryptography and Information Security)
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- MPP Characteristics of Variants of Merkle-Damgard Iterated Hash Functions
- TMAC: Two-Key CBC MAC (Symmetric Cipher) (Cryptography and Information Security)
- TMAC : Two-Key CBC MAC
- On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms(Discrete Mathematics and Its Applications)
- Hoe to Improve Interpolation Attack(Symmetric Key Cryptography)(Cryptography and Information Security)
- On the Pseudorandomness of KASUMI Type Permutations(Discrete Mathematics and Its Applications)
- Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k(Special Section on Cryptography and Information Security)
- On the Universal Hash Functions in Luby-Rackott Cipher (Symmetric Cipher) (Cryptography and Information Security)
- On the Universal Hash Functions in Luby-Rackoff Cipher