Abstract
The security of cascade ciphers, in which by definition the keys of the component ciphers are independent, is considered. It is shown by a counterexample that the intuitive result, formally stated and proved in the literature, that a cascade is at least as strong as the strongest component cipher, requires the uninterestingly restrictive assumption that the enemy cannot exploit information about the plaintext statistics. It is proved, for very general notions of breaking a cipher and of problem difficulty, that a cascade is at least as difficult to break as the first component cipher. A consequence of this result is that if the ciphers commute, then a cascade is at least as difficult to break as the most-difficult-to-break component cipher, i.e., the intuition that a cryptographic chain is at least as strong as its strongest link is then provably correct. It is noted that additive stream ciphers do commute, and this fact is used to suggest a strategy for designing secure practical ciphers. Other applications in cryptology are given of the arguments used to prove the cascade cipher result.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
E. F. Brickell and K. S. McCurley, An interactive identification scheme based on discrete logarithms and factoring,Advances in Cryptology—Eurocrypt ’90 (ed. I. B. Damgaard), pp. 63–71, Lecture Notes in Computer Science, Vol. 473, Berlin: Springer-Verlag, 1991.
W. Diffie and M. E. Hellman, Exhaustive cryptanalysis of the NBS Data Encryption Standard,IEEE Computer Magazine, Vol. 10, No. 6, June 1977, pp. 74–84.
S. Even and O. Goldreich, On the power of cascade ciphers,ACM Transactions on Computer Systems, Vol. 3, 1985, pp. 108–116.
K. S. McCurley, A key distribution system equivalent to factoring,Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 95–105.
R. C. Merkle and M. E. Hellman, On the security of multiple encryption,Communications of the ACM, Vol. 24, No. 7, July 1981, pp. 465–467.
C. E. Shannon, Communication theory of secrecy systems,Bell System Technical Journal, Vol. 28, Oct. 1949, pp. 656–715.
A. C. Yao, Theory and applications of trapdoor functions,Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, IEEE, New York, 1982, pp. 80–91.
Author information
Authors and Affiliations
Additional information
Communicated by Ernest F. Brickell
Rights and permissions
About this article
Cite this article
Maurer, U.M., Massey, J.L. Cascade ciphers: The importance of being first. J. Cryptology 6, 55–61 (1993). https://doi.org/10.1007/BF02620231
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF02620231