loading
Papers

Research.Publish.Connect.

Paper

Authors: Kaiyan Zheng and Peng Wang

Affiliation: Institute of Information Engineering, Chinese Academy of Sciences and University of Chinese Academy of Sciences, China

ISBN: 978-989-758-282-0

Keyword(s): Encryption Scheme, Blockwise Adaptive Attack, Related-key Attack, Even-Mansour.

Abstract: In this paper we discuss how to construct encryption schemes from permutations. Firstly we discuss an intuitive way to design permutation-based encryption schemes, that is by combining mainstream blockcipherbased encryption modes (such as CBC, OFB, CFB, CTR) with the Even-Mansour cipher, which is an elegant permutation-based blockcipher. Unfortunately, most of encryption schemes produced by the combination strategy are not secure enough. Then we propose 4 permutation-based encryption schemes - PCBC, POFB, PCFB and PCTR, which can resist both the blockwise adaptive attack and the F-related-key attack when using a non-repeated nonce. To illustrate it, we give a definition of the indistinguishability from random bits against blockwise adaptive chosen plaintext attack in the F-related-key setting, and then prove the security of PCBC in such definition. The other 3 schemes have similar results. Constructing from a single permutation, these 4 encryption schemes are practical, in the sense that they are less prone to misuse, bring less pressure on the key-management in real world, and apply to blockwise adaptive scenarios including real-time applications, on-line settings, memory-restricted devices, etc. Moreover they are more efficient than the Sponge construction. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 100.24.122.228

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Zheng, K. and Wang, P. (2018). Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR.In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-282-0, pages 452-460. DOI: 10.5220/0006713804520460

@conference{icissp18,
author={Kaiyan Zheng. and Peng Wang.},
title={Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR},
booktitle={Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2018},
pages={452-460},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006713804520460},
isbn={978-989-758-282-0},
}

TY - CONF

JO - Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR
SN - 978-989-758-282-0
AU - Zheng, K.
AU - Wang, P.
PY - 2018
SP - 452
EP - 460
DO - 10.5220/0006713804520460

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.