Skip to main content
Log in

Universal tweakable Even-Mansour cipher and its applications

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

The construction of the tweakable Even-Mansour cipher is in fact the designs of permutations, mask operations, and masking functions. For information-theoretic security, permutations are usually taken as random permutations. This paper focuses on the mask operations and masking functions to construct a universal tweakable Even-Mansour cipher. Firstly, we describe a formal definition of a universal masking function and provide a universal tweakable Even-Mansour cipher UTEM. In the random permutation model, we prove that UTEM is multi-key secure by H-coefficients technique. Then we show some efficient instantiations of the universal masking function to concertize UTEM. Finally, we apply UTEM to an encryption mode TIE (tweak incrementation encryption) and an authenticated encryption mode IAPM (integrity aware parallelizable mode), present two new schemes TIE-plus and IAPM-plus, and prove their security. UTEM enriches tweakable blockciphers, brings more research topics, and plays an important role in modes of operation, which will be of great significance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Qiao C, Brown K N, Zhang F, Tian Z. Federated adaptive asynchronous clustering algorithm for wireless mesh networks. IEEE Transactions on Knowledge and Data Engineering, 2021, DOI: https://doi.org/10.1109/TKDE.2021.3119550

  2. Shafiq M, Tian Z, Bashir A K, Du X, Guizani M. CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet of Things Journal, 2021, 8(5): 3242–3254

    Article  Google Scholar 

  3. Lu H, Jin C, Helu X, Du X, Guizani M, Tian Z. DeepAutoD: research on distributed machine learning oriented scalable mobile communication security unpacking system. IEEE Transactions on Network Science and Engineering, 2021, DOI: https://doi.org/10.1109/TNSE.2021.3100750

  4. Luo C, Tan Z, Min G, Gan J, Shi W, Tian Z. A novel web attack detection system for internet of things via ensemble classification. IEEE Transactions on Industrial Informatics, 2021, 17(8): 5810–5818

    Article  Google Scholar 

  5. Qiu J, Chai Y, Tian Z, Du X, Guizani M. Automatic concept extraction based on semantic graphs from big data in smart city. IEEE Transactions on Computational Social Systems, 2020, 7(1): 225–233

    Article  Google Scholar 

  6. Liskov M, Rivest R L, Wagner D. Tweakable block ciphers. In: Proceedings of the 22nd Annual International Cryptology Conference. 2002, 31–46

  7. Halevi S, Rogaway P. A tweakable enciphering mode. In: Proceedings of the 23rd Annual International Cryptology Conference. 2003, 482–499

  8. Halevi S, Rogaway P. A parallelizable enciphering mode. In: Proceedings of Cryptographers’ Track at the RSA Conference. 2004, 292–304

  9. Rogaway P, Zhang H. Online ciphers from tweakable blockciphers. In: Proceedings of Cryptographers’ Track at the RSA Conference 2011. 2011, 237–249

  10. Chakraborti A, Nandi M, Talnikar S, Yasuda K. On the composition of single-keyed tweakable even-mansour for achieving BBB security. IACR Transactions on Symmetric Cryptology, 2020, 2020(2): 1–39

    Article  Google Scholar 

  11. Rogaway P. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Proceedings of the 10th International Conference on the Theory and Application of Cryptology and Information Security. 2004, 16–31

  12. Chakraborty D, Sarkar P. A general construction of tweakable block ciphers and different modes of operations. IEEE Transactions on Information Theory, 2008, 54(5): 1991–2006

    Article  MathSciNet  MATH  Google Scholar 

  13. Landecker W, Shrimpton T, Terashima R S. Tweakable blockciphers with beyond birthday-bound security. In: Proceedings of the 32nd Annual Cryptology Conference. 2012, 14–30

  14. Krovetz T, Rogaway P. The software performance of authenticated-encryption modes. In: Proceedings of the 18th International Workshop on Fast Software Encryption. 2011, 306–327

  15. Andreeva E, Bogdanov A, Luykx A, Mennink B, Tischhauser E, Yasuda K. Parallelizable and authenticated online ciphers. In: Proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information Security. 2013, 424–443

  16. Granger R, Jovanovic P, Mennink B, Neves S. Improved masking for tweakable blockciphers with applications to authenticated encryption. In: Proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2016, 263–293

  17. Bossuet L, Datta N, Mancillas-López C, Nandi M. ELmD: a pipelineable authenticated encryption and its hardware implementation. IEEE Transactions on Computers, 2016, 65(11): 3318–3331

    Article  MathSciNet  MATH  Google Scholar 

  18. Peyrin T, Seurin Y. Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 33–63

  19. Naito Y. Tweakable blockciphers for efficient authenticated encryptions with beyond the birthday-bound security. IACR Transactions on Symmetric Cryptology, 2017, 2017(2): 1–26

    Article  Google Scholar 

  20. Bao Z, Guo J, Iwata T, Minematsu K. ZOCB and ZOTR: tweakable blockcipher modes for authenticated encryption with full absorption. IACR Transactions on Symmetric Cryptology, 2019, 2019(2): 1–54

    Article  Google Scholar 

  21. Naito Y, Sugawara T. Lightweight authenticated encryption mode of operation for tweakable block ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020(1): 66–94

    Google Scholar 

  22. Naito Y, Sasaki Y, Sugawara T. Lightweight authenticated encryption mode suitable for threshold implementation. In: Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2020, 705–735

  23. Cogliati B, Lampe R, Seurin Y. Tweaking even-mansour ciphers. In: Proceedings of the 35th Annual Cryptology Conference. 2015, 189–208

  24. Cogliati B, Seurin Y. Beyond-birthday-bound security for tweakable even-mansour ciphers with linear tweak and key mixing. In: Proceedings of the 21st International Conference on the Theory and Application of Cryptology and Information Security. 2015, 134–158

  25. Mennink B. XPX: generalized tweakable even-mansour with improved security guarantees. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 64–94

  26. Reyhanitabar R, Vaudenay S, Vizár D. Misuse-resistant variants of the OMD authenticated encryption mode. In: Proceedings of the 8th International Conference on Provable Security. 2014, 55–70

  27. Reyhanitabar R, Vaudenay S, Vizár D. Boosting OMD for almost free authentication of associated data. In: Proceedings of the 22nd International Workshop on Fast Software Encryption. 2015, 411–427

  28. Jean J, Nikolić I, Peyrin T. Tweaks and keys for block ciphers: the TWEAKEY framework. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security. 2014, 274–288

  29. Biham E. New types of cryptanalytic attacks using related keys. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques Lofthus. 1993, 398–409

  30. Biham E. New types of cryptanalytic attacks using related keys. Journal of Cryptology, 1994, 7(4): 229–246

    Article  MATH  Google Scholar 

  31. Bellare M, Kohno T. A theoretical treatment of related-key attacks: rkaprps, rka-prfs, and applications. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2003, 491–506

  32. Zhang P, Hu H-G. Generalized tweakable even-mansour cipher and its applications. Journal of Computer Science and Technology, 2018, 33(6): 1261–1277

    Article  MathSciNet  Google Scholar 

  33. Fouque P A, Joux A, Mavromati C. Multi-user collisions: applications to discrete logarithm, even-mansour and PRINCE. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security. 2014, 420–438

  34. Mouha N, Luykx A. Multi-key security: the even-mansour construction revisited. In: Proceedings of the 35th Annual Cryptology Conference. 2015, 209–223

  35. Bellare M, Tackmann B. The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 247–276

  36. Hoang V T, Tessaro S. Key-alternating ciphers and key-length extension: exact bounds and multi-user security. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 3–32

  37. Guo Z, Wu W, Liu R, Zhang L. Multi-key analysis of tweakable even-mansour with applications to minalpher and OPP. IACR Transactions on Symmetric Cryptology, 2017, 2016(2): 288–306

    Article  Google Scholar 

  38. Zhang P, Yuan Q, Hu H, Wang P. Multi-user security of the tweakable Even-Mansour cipher. Science China Information Sciences, 2021, 64(3): 139102

    Article  Google Scholar 

  39. Dutta A. Minimizing the two-round tweakable Even-Mansour cipher. In: Proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security. 2020, 601–629

  40. Kim H, Lee Y, Lee J. Forking tweakable Even-Mansour ciphers. IACR Transactions on Symmetric Cryptology, 2020, 2020(4): 71–87

    Article  Google Scholar 

  41. Jutla C S. Encryption modes with almost free message integrity. Journal of Cryptology, 2008, 21(4): 547–578

    Article  MathSciNet  MATH  Google Scholar 

  42. Patarin J. The “coefficients H” technique. In: Proceedings of the 15th International Conference on Selected Areas in Cryptography. 2008, 328–345

  43. Rogaway P, Bellare M, Black J. OCB: a block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security, 2003, 6(3): 365–403

    Article  Google Scholar 

  44. Kurosawa K. Power of a public random permutation and its application to authenticated encryption. IEEE Transactions on Information Theory, 2010, 56(10): 5366–5374

    Article  MathSciNet  MATH  Google Scholar 

  45. Kuwakado H, Morii M. Security on the quantum-type Even-Mansour cipher. In: Proceedings of 2012 International Symposium on Information Theory and its Applications. 2012, 312–316

  46. Crowley P, Biggers E. Adiantum: length-preserving encryption for entry-level processors. IACR Transactions on Symmetric Cryptology, 2018, 2018(4): 39–61

    Article  Google Scholar 

  47. Hastad J. The security of the IAPM and IACBC modes. Journal of Cryptology, 2007, 20(2): 153–163

    Article  MathSciNet  MATH  Google Scholar 

  48. Hosoyamada A, Iwata T. Provably quantum-secure tweakable block ciphers. IACR Transactions on Symmetric Cryptology, 2021, 2021(1): 337–377

    Article  Google Scholar 

Download references

Acknowledgements

We would like to express our sincere thanks to editors and the anonymous reviewers for the valuable comments and suggestions. This work was supported by the National Key Research and Development Program of China (2019YFB2101704), National Natural Science Foundation of China (Grant Nos. 61902195 and 62102196), and NUPTSF (NY219131).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ping Zhang(✉).

Additional information

Ping Zhang received his PhD degree in information and communication engineering from the University of Science and Technology of China, China in June 2018. Since January 2019, he has been working in the School of Computer Science at Nanjing University of Posts and Telecommunications, China. His major research interests include data security, block cipher modes of operation, authenticated encryption, quantum security, and financial cryptography.

Electronic Supplementary Material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang(✉), P. Universal tweakable Even-Mansour cipher and its applications. Front. Comput. Sci. 17, 174807 (2023). https://doi.org/10.1007/s11704-022-1466-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-022-1466-1

Keywords

Navigation