Short Non-Malleable Codes from Related-Key Secure Block Ciphers
A non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original message, or in an unrelated message. We consider the simplest possible construction in the computational split-state model, which simply enc...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2018-03-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/854 |
id |
doaj-76567a1bae5f42edaa9c670ac8f3f779 |
---|---|
record_format |
Article |
spelling |
doaj-76567a1bae5f42edaa9c670ac8f3f7792021-03-02T10:44:24ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2018-03-0133635210.13154/tosc.v2018.i1.336-352854Short Non-Malleable Codes from Related-Key Secure Block CiphersSerge Fehr0Pierre Karpman1Bart Mennink2CWI, AmsterdamUniv. Grenoble Alpes, CNRS, Grenoble INP, LJK, 38000 GrenobleCWI, Amsterdam; Digital Security Group, Radboud University, NijmegenA non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original message, or in an unrelated message. We consider the simplest possible construction in the computational split-state model, which simply encodes a message m as k||Ek(m) for a uniformly random key k, where E is a block cipher. This construction is comparable to, but greatly simplifies over, the one of Kiayias et al. (ACM CCS 2016), who eschewed this simple scheme in fear of related-key attacks on E. In this work, we prove this construction to be a strong non-malleable code as long as E is (i) a pseudorandom permutation under leakage and (ii) related-key secure with respect to an arbitrary but fixed key relation. Both properties are believed to hold for “good” block ciphers, such as AES-128, making this non-malleable code very efficient with short codewords of length |m|+2τ (where τ is the security parameter, e.g., 128 bits), without significant security penalty.https://tosc.iacr.org/index.php/ToSC/article/view/854Non-malleable codesplit-state tampering modelrelated-key securityblock cipher |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Serge Fehr Pierre Karpman Bart Mennink |
spellingShingle |
Serge Fehr Pierre Karpman Bart Mennink Short Non-Malleable Codes from Related-Key Secure Block Ciphers IACR Transactions on Symmetric Cryptology Non-malleable code split-state tampering model related-key security block cipher |
author_facet |
Serge Fehr Pierre Karpman Bart Mennink |
author_sort |
Serge Fehr |
title |
Short Non-Malleable Codes from Related-Key Secure Block Ciphers |
title_short |
Short Non-Malleable Codes from Related-Key Secure Block Ciphers |
title_full |
Short Non-Malleable Codes from Related-Key Secure Block Ciphers |
title_fullStr |
Short Non-Malleable Codes from Related-Key Secure Block Ciphers |
title_full_unstemmed |
Short Non-Malleable Codes from Related-Key Secure Block Ciphers |
title_sort |
short non-malleable codes from related-key secure block ciphers |
publisher |
Ruhr-Universität Bochum |
series |
IACR Transactions on Symmetric Cryptology |
issn |
2519-173X |
publishDate |
2018-03-01 |
description |
A non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original message, or in an unrelated message. We consider the simplest possible construction in the computational split-state model, which simply encodes a message m as k||Ek(m) for a uniformly random key k, where E is a block cipher. This construction is comparable to, but greatly simplifies over, the one of Kiayias et al. (ACM CCS 2016), who eschewed this simple scheme in fear of related-key attacks on E. In this work, we prove this construction to be a strong non-malleable code as long as E is (i) a pseudorandom permutation under leakage and (ii) related-key secure with respect to an arbitrary but fixed key relation. Both properties are believed to hold for “good” block ciphers, such as AES-128, making this non-malleable code very efficient with short codewords of length |m|+2τ (where τ is the security parameter, e.g., 128 bits), without significant security penalty. |
topic |
Non-malleable code split-state tampering model related-key security block cipher |
url |
https://tosc.iacr.org/index.php/ToSC/article/view/854 |
work_keys_str_mv |
AT sergefehr shortnonmalleablecodesfromrelatedkeysecureblockciphers AT pierrekarpman shortnonmalleablecodesfromrelatedkeysecureblockciphers AT bartmennink shortnonmalleablecodesfromrelatedkeysecureblockciphers |
_version_ |
1724236305849647104 |