Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Security of Symmetric Primitives against Key-Correlated Attacks

View through CrossRef
We study the security of symmetric primitives against key-correlated attacks (KCA), whereby an adversary can arbitrarily correlate keys, messages, and ciphertexts. Security against KCA is required whenever a primitive should securely encrypt key-dependent data, even when it is used under related keys. KCA is a strengthening of the previously considered notions of related-key attack (RKA) and key-dependent message (KDM) security. This strengthening is strict, as we show that 2-round Even–Mansour fails to be KCA secure even though it is both RKA and KDM secure. We provide feasibility results in the ideal-cipher model for KCAs and show that 3-round Even–Mansour is KCA secure under key offsets in the random-permutation model. We also give a natural transformation that converts any authenticated encryption scheme to a KCA-secure one in the random-oracle model. Conceptually, our results allow for a unified treatment of RKA and KDM security in idealized models of computation.
Title: Security of Symmetric Primitives against Key-Correlated Attacks
Description:
We study the security of symmetric primitives against key-correlated attacks (KCA), whereby an adversary can arbitrarily correlate keys, messages, and ciphertexts.
Security against KCA is required whenever a primitive should securely encrypt key-dependent data, even when it is used under related keys.
KCA is a strengthening of the previously considered notions of related-key attack (RKA) and key-dependent message (KDM) security.
This strengthening is strict, as we show that 2-round Even–Mansour fails to be KCA secure even though it is both RKA and KDM secure.
We provide feasibility results in the ideal-cipher model for KCAs and show that 3-round Even–Mansour is KCA secure under key offsets in the random-permutation model.
We also give a natural transformation that converts any authenticated encryption scheme to a KCA-secure one in the random-oracle model.
Conceptually, our results allow for a unified treatment of RKA and KDM security in idealized models of computation.

Related Results

An Overview of DRAM-Based Security Primitives
An Overview of DRAM-Based Security Primitives
Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. ...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
Human Security
Human Security
The term “human security” was first employed in the United Nations Development Programme (UNDP) Human Development Report (HDR) of 1994, which argued for a “people-centric” concept ...
Symmetric cryptanalysis ˸ from primitives to modes
Symmetric cryptanalysis ˸ from primitives to modes
Cryptanalyse symétrique ˸ des primitives aux modes Ce manuscrit présente des contributions à l'analyse de la sécurité des cryptosystèmes symétriques, ou cryptanalys...
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Recommender systems have become an integral part of online services due to their ability to help users locate specific information in a sea of data. However, existing studies show ...
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Abstract. Introduction. The article examines the place of personnel security as a component of the system of economic security at enterprises. The main approaches to the formation ...

Back to Top