Abstract
We demonstrate the existence of an efficient block cipher with the property that whenever it is composed with any non-perfect cipher, the resulting product is strictly more secure, against an ideal adversary, than the original cipher. We call this property universal security amplification, and note that it holds trivially for a one-time pad (a stream cipher). However, as far as we are aware, this is the first efficient block cipher with this property. Several practical implications of this result are considered.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
W. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan. Security amplification by composition: The case of doubly-iterated, ideal ciphers. In H. Krawczyk, editor, Advances in Cryptology-CRYPTO ’98, Berlin, 1998. Springer-Verlag.
David J. Aldous and Persi Diaconis. Shuffing cards and stopping times. Amer. Math. Monthly, 93:333–348, 1986.
Christian Cachin. Entropy Measures and Unconditional Security in Cryptography. PhD thesis, ETH Züurich, 1997.
Keith W. Campbell and Michael J. Wiener. DES is not a group. In Ernest F. Brickell, editor, Advances in Cryptology-CRYPTO ’92, pages 512–517, Berlin, 1992. Springer-Verlag.
P. W. Day. Rearrangement inequalities. Canad. J. Math., 24:930–943, 1972.
Persi Diaconis. Group Representations in Probability and Statistics. Institute of Mathematical Statistics, Hayward, CA, 1988.
John D. Dixon and Brian Mortimer. Permutation Groups. Springer-Verlag, New York, 1996.
S. Even and O. Goldreich. On the power of cascade ciphers. ACM Transactions on Computer Systems, 3(2), 1985.
Michael R. Garey and David S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, New York, 2nd edition, 1979.
Roe Goodman and Nolan R. Wallach. Representations and Invariants of the Classical Groups, volume 68 of Encyclopedia of Mathematics and its Applications. Cambridge University Press, Cambridge, 1998.
G. R. Grimmett and D. R. Stirzaker. Probability and Random Processes. Oxford University Press, Oxford, 2nd edition, 1992.
Nathan Jacobson. Basic Algebra II. W. H. Freeman and Company, New York, 2nd edition, 1980.
Albert W. Marshall and Ingram Olkin. Inequalities: Theory of Majorization and Its Applications. Academic Press, San Diego, 1979.
Ueli M. Maurer and James L. Massey. Cascade ciphers: The importance of being first. Journal of Cryptology, 6:55–61, 1993.
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, 1997.
Moni Naor and Omer Reingold. On the construction of pseudorandom permutations: Luby-Racko. revisited. Journal of Cryptology, 12:29–66, 1999.
John O. Pliam. Ciphers and their Products: Group Theory in Private Key Cryptography. PhD thesis, University of Minnesota, July 1999. URL: http://www.ima.umn.edu/~pliam/doc.
John O. Pliam. Guesswork and variation distance as measures of cipher security. In Selected Areas in Cryptography-SAC’99, LNCS 1758, pages 62–77, Berlin, 2000. Springer-Verlag.
Joseph J. Rotman. An Introduction to the Theory of Groups. Wm. C. Brown, Dubuque, IA, 3rd edition, 1988.
Claude E. Shannon. Communication theory of secrecy systems. Bell System Tech. Jour., 28:656–715, 1949.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pliam, J.O. (2001). A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers. In: Stinson, D.R., Tavares, S. (eds) Selected Areas in Cryptography. SAC 2000. Lecture Notes in Computer Science, vol 2012. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44983-3_13
Download citation
DOI: https://doi.org/10.1007/3-540-44983-3_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42069-9
Online ISBN: 978-3-540-44983-6
eBook Packages: Springer Book Archive