A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations

Abstract : Within many cryptographic systems a key expansion function is used in order to derive more keying material from the master secret. The derived additional keys may be needed for multiple entities or for different cryptographic purposes such as privacy and authenticity. In this paper we wish to examine the soundness of the key expansion functions on the view point of provable security framework. Especially we focus on the key expansion functions using PRFs(pseudorandom functions) which are recommended by NIST, and show that the variant of Double-Pipeline Iteration mode using PRPs(pseudorandom permutations) is secure, while the variants of Counter and Feedback modes using PRPs are insecure. In practice secure block ciphers such as AES can be regarded as PRPs.
Type de document :
Communication dans un congrès
David Naccache; Damien Sauveron. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-8501, pp.10-23, 2014, Information Security Theory and Practice. Securing the Internet of Things. 〈10.1007/978-3-662-43826-8_2〉
Liste complète des métadonnées

Littérature citée [8 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01400917
Contributeur : Hal Ifip <>
Soumis le : mardi 22 novembre 2016 - 16:18:55
Dernière modification le : mercredi 23 novembre 2016 - 08:47:43
Document(s) archivé(s) le : lundi 20 mars 2017 - 19:55:18

Fichier

978-3-662-43826-8_2_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Ju-Sung Kang, Nayoung Kim, Wangho Ju, Ok-Yeon Yi. A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations. David Naccache; Damien Sauveron. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-8501, pp.10-23, 2014, Information Security Theory and Practice. Securing the Internet of Things. 〈10.1007/978-3-662-43826-8_2〉. 〈hal-01400917〉

Partager

Métriques

Consultations de la notice

247

Téléchargements de fichiers

41