Sha-zam: A Block Cipher. Fast as DES, Secure as SHA

We describe a block cipher which is both practical and provably secure as SHA-1. The cipher uses the Secure Hash Algorithm (SHA-1) as an underlying primitive, and we show that any succesful attack on the cipher results in a succesful attack against one or more of the hallowed properties of SHA-1. Moreover, our block cipher is still as fast as the Data Encryption Standard (DES). We also describe a practical Pseudo-Random Generator which again is as secure as SHA-1. We apply this generator for secure key scheduling and since it is based on the same underlying primitive as our cipher, we get eecient reuse of our code. Finally we describe a construction of an eecient family of universal hash functions which are used by our cipher, which may be of independent interest.

[1]  Eli Biham,et al.  Two Practical and Provably Secure Block Ciphers: BEARS and LION , 1996, FSE.

[2]  Sarvar Patel,et al.  An Efficient Discrete Log Pseudo Random Generator , 1998, CRYPTO.

[3]  N. Åslund Universal Hash Functions & Hard Core Bits , 1995 .

[4]  Oded Goldreich,et al.  RSA/Rabin Bits are 1/2 + 1/poly(log N) Secure , 1984, FOCS.

[5]  U. Maurer A Simpliied and Generalized Treatment of Luby-rackoo Pseudorandom Permutation Generators , 1992 .

[6]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[7]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[8]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[9]  Bart Preneel,et al.  Integrity Primitives for Secure Information Systems , 2005, Lecture Notes in Computer Science.

[10]  M. Näslund All Bits in ax + b mod p are Hard , 1996, CRYPTO 1996.

[11]  Leonid A. Levin,et al.  A hard-core predicate for all one-way functions , 1989, STOC '89.

[12]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[13]  M. Blum,et al.  A simple secure pseudo-random number generator , 1982 .

[14]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[15]  Adi Shamir,et al.  On the cryptographic security of single RSA bits , 1983, STOC '83.