Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Image from Google Jackets

Investigating security of a few schemes based on public primitives/ Anik Raychaudhuri

By: Material type: TextTextPublication details: Kolkata: Indian Statistical Institute, 2023Description: 128 pages, figsSubject(s): DDC classification:
  • 23rd 005.82 R263
Online resources:
Contents:
Introduction -- Preliminaries -- Indifferentiability of Tweakable LR3 -- Beyond Birthday Bound Security for 5-Round Even-Mansour-Based Key-Alternating Feistel Ciphers -- Crooked Indifferentiability of Enveloped Xor -- Subversion Resilient Hashing: Efficient Constructions and Modular Proofs for Crooked Indifferentiability -- Concluding Discussion and Future Research Directions
Production credits:
  • Guided by Prof. Mridul Nandi
Dissertation note: Thesis (Ph.D) - Indian Statistical Institute, 2023 Summary: Random oracles are cryptographers’ conceptions of what an ’ideal’ hash function should be.Put succinctly, a random oracle is a perfectly random function that you can evaluate quickly. Random functions are beautiful not just because the output is random-looking (of course) but also because they’re automatically collision-resistant and pre-image resistant. However, we know of nothing in the ’real’ world that can approximate them. When cryptographers try to analyse their schemes with random functions, they enter an imaginary fantasy world called the ’random oracle model’. In 2004, Maurer, Renner, and Holenstein gave us a powerful tool for answering this question. What they showed is that it’s always possible to replace functionality A (e.g., a random oracle) with another functionality B (e.g., an ideal compression function) provided that the following rules are satisfied: We can ’construct’ something ’like’ A out of B. We can ’simulate’ something ’like’ B using A. An attacker who interacts with constructed A-like thing, B cannot tell the difference (i.e., can’t differentiate it) from A, simulated B-like thing.The notion of indifferentiability is very helpful for investigating the security of cryptographic schemes based on public primitives. The public permutation model is another model that helps to scrutinise the security of schemes based on public primitives. In this model, rather than simulating, the adversary also has direct access to the underlying primitives in the ideal world. This model is generally used to analyse keyed constructions as opposed to unkeyed constructions in indifferentiability. In this thesis, we look at indifferentiability and related security notions in detail. We look back at the definitions and then look at some constructions that achieve the desired security goals. Specifically: • We look at the 3-round tweakable random permutation-based cipher introduced by Coron et al. in [1] and improve their security results by a factor of 2. • We also look at the security of Even-Mansour-based key-alternating ciphers in the public permutation model. We show that 5-round Even-Mansour-based key alternating ciphers achieve beyond birthday security (2n/3−bits). • Finally, we dive deeper into the notion of crooked indifferentiability introduced by Russell et al. in [2]. crooked indifferentiability is a novel concept that can be used to build secure constructions from subverted primitives. Russell et al. showed that the enveloped xor construction is crooked indifferentiable from a random oracle. We found some mistakes in their proofs and then corrected them. We also develop a new technique to analyse crooked indifferentiability and then use it to show the security of the Sponge and the Merkle- Damg˚ard constructions, both of which are easier to implement and less costly in memory uses than the enveloped xor construction.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Notes Date due Barcode Item holds
THESIS ISI Library, Kolkata 005.82 R263 (Browse shelf(Opens below)) Available E-Thesis. Guided by Prof. Mridul Nandi TH614
Total holds: 0

Thesis (Ph.D) - Indian Statistical Institute, 2023

Includes bibliography

Introduction -- Preliminaries -- Indifferentiability of Tweakable LR3 -- Beyond Birthday Bound Security
for 5-Round Even-Mansour-Based Key-Alternating Feistel Ciphers -- Crooked Indifferentiability of Enveloped Xor -- Subversion Resilient Hashing: Efficient Constructions and Modular Proofs for Crooked Indifferentiability -- Concluding Discussion and Future Research Directions

Guided by Prof. Mridul Nandi

Random oracles are cryptographers’ conceptions of what an ’ideal’ hash function should be.Put succinctly, a random oracle is a perfectly random function that you can evaluate quickly. Random functions are beautiful not just because the output is random-looking (of course) but also because they’re automatically collision-resistant and pre-image resistant. However, we know of nothing in the ’real’ world that can approximate them. When cryptographers try to analyse their schemes with random functions, they enter an imaginary fantasy world called the ’random oracle model’. In 2004, Maurer, Renner, and Holenstein gave us a powerful tool for answering this question. What they showed is that it’s always possible to replace functionality A (e.g., a random oracle) with another functionality B (e.g., an ideal compression function) provided that the following rules are satisfied: We can ’construct’ something ’like’ A out of B. We can ’simulate’ something ’like’ B using A. An attacker who interacts with constructed A-like thing, B cannot tell the difference (i.e., can’t differentiate it) from A, simulated B-like thing.The notion of indifferentiability is very helpful for investigating the security of cryptographic schemes based on public primitives. The public permutation model is another model that helps to scrutinise the security of schemes based on public primitives. In this model, rather than simulating, the adversary also has direct access to the underlying primitives in the ideal world. This model is generally used to analyse keyed constructions as opposed to unkeyed constructions in indifferentiability. In this thesis, we look at indifferentiability and related security notions in detail. We look back at the definitions and then look at some constructions that achieve the desired security goals. Specifically: • We look at the 3-round tweakable random permutation-based cipher introduced by Coron et al. in [1] and improve their security results by a factor of 2. • We also look at the security of Even-Mansour-based key-alternating ciphers in the public permutation model. We show that 5-round Even-Mansour-based key alternating ciphers achieve beyond birthday security (2n/3−bits). • Finally, we dive deeper into the notion of crooked indifferentiability introduced by Russell et al. in [2]. crooked indifferentiability is a novel concept that can be used to build secure constructions from subverted primitives. Russell et al. showed that the enveloped xor construction is crooked indifferentiable from a random oracle. We found some mistakes in their proofs and then corrected them. We also develop a new technique to analyse crooked indifferentiability and then use it to show the security of the Sponge and the Merkle- Damg˚ard constructions, both of which are easier to implement and less costly in memory uses than the enveloped xor construction.

There are no comments on this title.

to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in