Security of Hash-then-CBC Key Wrapping Revisited
スポンサーリンク
概要
- 論文の詳細を見る
Key wrapping schemes are used to encrypt data of high entropy, such as cryptographic keys. There are two known security definitions for key wrapping schemes. One captures the security against chosen plaintext attacks (called DAE-security), and the other captures known plaintext attacks (called AKW-security). In this paper, we revisit the security of Hash-then-CBC key wrapping schemes. In [17], Osaki and Iwata showed that the UCC-then-CBC key wrapping scheme, a key wrapping scheme that uses the UCC hash function and CBC mode, has provable AKW-security. In this paper, we show that the scheme achieves the stronger notion of DAE-security. We also show our proof in the variable input length setting, where the adversary is allowed making queries of varying lengths. Furthermore, we consider the scheme that incorporates the use of headers. To handle such a setting, we generalize the previous definition of the UCC hash function to the variable input length setting and to take the header as its input, and show an efficient construction that meets the definition.
著者
-
Iwata Tetsu
Dept. Of Computational Science And Engineering Nagoya University
-
Osaki Yasushi
Dept. Of Computational Science And Engineering Nagoya University
関連論文
- Side Channel Attacks on Message Authentication Codes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- How to Construct Super-Pseudorandom Permutations with Short Keys(Symmetric Cryptography,Cryptography and Information Security)
- Further More on Key Wrapping
- Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures
- Cryptanalysis of 249-, 250-, ..., 256-Bit Key HyRAL via Equivalent Keys
- Security of Hash-then-CBC Key Wrapping Revisited
- Side Channel Attacks on Message Authentication Codes
- Side Channel Attacks on Message Authentication Codes