Even and Mansour [EM97] proposed a block cipher construction that takes a publicly computable random permutation oracle P and XORs different keys prior to and after applying P : C =k 2 ⊕ P(M ⊕ k 1). They did not, however, describe how one could instantiate such a permutation securely. It is a fundamental open problem whether their construction could be proved secure outside the random permutation oracle model. We resolve this question in the affirmative by showing that the construction can be proved secure in the random function oracle model. In particular, we show that the random permutation oracle in their scheme can be replaced by a construction that utilizes a four-round Feistel network (where each round function is a random function oracle publicly computable by all parties including the adversary). Further, we prove that the resulting cipher is super pseudorandom – the adversary’s distinguishing advantage is at most 2q 2/2 n if he makes q total queries to the cipher, its inverse, as well as any random oracles. Even and Mansour, on the other hand, only showed security against inversion and forgery. One noteworthy aspect of this result is that the cipher remains secure even though the adversary is permitted separate oracle access to all of the round functions. One can achieve a two-fold and four-fold reduction respectively in the amount of key material by a closer inspection of the proof and by instantiating the scheme using group operations other than exclusive-OR. On the negative side, a straightforward adaption of an advanced slide attack recovers the 4n-bit key with approximately \(\sqrt{2} \cdot 2^{n}\) work using roughly \(\sqrt{2} \cdot 2^{n}\) known plaintexts. Finally, if only three Feistel rounds are used, the resulting cipher is pseudorandom, but not super pseudorandom.
[1]
Mihir Bellare,et al.
Random oracles are practical: a paradigm for designing efficient protocols
,
1993,
CCS '93.
[2]
Mihir Bellare,et al.
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
,
2004,
EUROCRYPT.
[3]
Joe Kilian,et al.
How to Protect DES Against Exhaustive Key Search
,
1996,
CRYPTO.
[4]
Zulfikar Ramzan,et al.
On the Round Security of Symmetric-Key Cryptographic Primitives
,
2000,
CRYPTO.
[5]
Silvio Micali,et al.
How to construct random functions
,
1986,
JACM.
[6]
Ran Canetti,et al.
The random oracle methodology, revisited
,
2000,
JACM.
[7]
Mihir Bellare,et al.
The Security of Cipher Block Chaining
,
1994,
CRYPTO.
[8]
Michael Luby,et al.
How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract)
,
1986,
CRYPTO.
[9]
Joan Daemen,et al.
Limitations of the Even-Mansour Construction
,
1991,
ASIACRYPT.
[10]
Yael Tauman Kalai,et al.
On the (In)security of the Fiat-Shamir paradigm
,
2003,
44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[11]
Sarvar Patel,et al.
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive
,
2002,
Selected Areas in Cryptography.
[12]
Alex Biryukov,et al.
Advanced Slide Attacks
,
2000,
EUROCRYPT.
[13]
Hugo Krawczyk,et al.
Pseudorandom functions revisited: the cascade construction and its concrete security
,
1996,
Proceedings of 37th Conference on Foundations of Computer Science.
[14]
Ran Canetti,et al.
The random oracle methodology, revisited
,
2000,
JACM.