the AES has a random profile after only 3
rounds (Soto and Bassham, 2000).
(d) The security of Even-Mansour is:
i. About 2
255
, using exhaustive search over
the key space (K1 and K2 are both of size
128-bits), which is considered large enough
by todays standards.
ii. Daemen demonstrated in (Daemen, 1991)
that a known plaintext attack, will take on
average 2
127
calculations, which has the
same complexity as attacking AES with
128-bits key, which is considered secure
with todays technology.
iii. Daemen also demonstrated in (Daemen,
1991) that a chosen plaintext attack, will
take on average 2
64
calculations using 2
64
stored blocks. By limiting the number of
encrypted blocks per client, this attack can
be avoided (see Section 6.2, as each client
encrypts maximum 2
32
blocks using the
same secondary key, if for some applica-
tion more data is needed to be encrypted the
client can join a new cluster ”using a fresh
secondary key” or new fresh secondary key
can be generated for that client).
iv. Biryukov-Wagner demonstrated in
(Biryukov and Wagner, 2000), that a
”sliding with a twist” attack allows an ad-
versary to recover the key using
√
2 ×2
64
known plaintexts and
√
2 ×2
64
work. By
limiting the number of blocks encrypted
per client using the same secondary key,
this attack can be avoided (see Section 6.2).
The most powerful attacker is B, where an inside at-
tacker attack a client in the same cluster. This happens
with probability (n-1)/(N-1). So as n decreases and/or
N increases, the probability of the existence of such
attacker decreases. Even if attacker B exists, the com-
plexity to mount Daemen’s known plaintext attack is
the same complexity to attack AES with 128-bits key,
which is considered secure with todays technology.
On the other hand, to limit the probability of the other
attacks, the number of encrypted blocks per client (us-
ing the same secondary key) MUST NOT reach the
2
64
boundary. Therefore the server MUST generate a
fresh key (for each client) before 2
64
blocks are en-
crypted with the same key. We recommend that the
server encrypts maximum 2
32
blocks for each client,
if for some application more data is needed to be en-
crypted the client can join a new cluster or new fresh
secondary key can be generated for that client.
So SchemeS
n
is upper bounded with the secu-
rity of AESS and lower bounded with the security of
Even-Mansour.
7 CONCLUSIONS
In this paper, we proposed a novel encryption scheme
for high-speed networks. We analyzed our proposed
scheme with the two most widely used schemes. Our
analysis consists of theoretical and practical parts.
This analysis illustrates that our proposed scheme is
superior than the current schemes, by possessing high
throughput, consuming the lowest amount of mem-
ory, serving the largest number of concurrent clients
and it is also considered secure.
REFERENCES
Bellare, M., Desai, A., Jokipii, E., and Rogaway, P. (1997).
A Concrete Security Treatment of Symmetric Encryp-
tion. In FOCS ’97: Proceedings of the 38th An-
nual Symposium on Foundations of Computer Science
(FOCS ’97), page 394, Washington, DC, USA. IEEE
Computer Society.
Bellare, M., Krovetz, T., and Rogaway, P. (1998). Luby-
Rackoff backwards: Increasing security by making
block ciphers non-invertible. Lecture Notes in Com-
puter Science, 1403.
Biryukov, A. and Wagner, D. (2000). Advanced Slide At-
tacks. In Advances in Cryptology—Eurocrypt ’00 Pro-
ceeding.
Borman, D., Deering, S., and Hinden, R. (1999). IPv6 Jum-
bograms. RFC 2675.
Daemen, J. (1991). Limitations of the Even-Mansour Con-
struction. In ASIACRYPT: Advances in Cryptology
– ASIACRYPT: International Conference on the The-
ory and Application of Cryptology. LNCS, Springer-
Verlag.
Daemen, J. and Rijmen, V. (1998). AES Proposal: Rijndael.
http://citeseer.ist.psu.edu/daemen98aes.html.
Dunn, J. and Martin, C. (2000). Terminology for ATM
Benchmarking. RFC 2761.
El-Fotouh, M. and Diepold, K. (2008). Dynamic Substi-
tution Model. In The Fourth International Confer-
ence on Information Assurance and Security (IAS’08),
Naples, Italy.
Even, S. and Mansour, Y. (1997). A Construction of a Ci-
pher from a Single Pseudorandom Permutation. Jour-
nal of Cryptology: the journal of the International As-
sociation for Cryptologic Research, 10(3):151–161.
Gaj, K. and Chodowiec, P. (1999). Hardware performance
of the AES finalists - survey and analysis of results.
http://ece.gmu.edu/crypto/AES survey.pdf.
Gladman, B. (2006). AES optimized C/C++ code. http: //
fp.gladman.plus.com/ AES /index.htm.
Greg, C. (1998). The nature of the beast: Recent Traf-
fic Measurements from an Internet backbone. cite-
seer.ist.psu.edu/673025.html.
SECRYPT 2008 - International Conference on Security and Cryptography
126