The construction of the tweakable Even-Mansour cipher is in fact the designs of permutations,mask operations,and masking functions.For information-theoretic security,permutations are usually taken as random permutatio...The construction of the tweakable Even-Mansour cipher is in fact the designs of permutations,mask operations,and masking functions.For information-theoretic security,permutations are usually taken as random permutations.This paper focuses on the mask operations and masking functions to construct a universal tweakable Even-Mansour cipher.Firstly,we describe a formal definition of a universal masking function and provide a universal tweakable Even-Mansour cipher UTEM.In the random permutation model,we prove that UTEM is multi-key secure by H-coefficients technique.Then we show some efficient instantiations of the universal masking function to concertize UTEM.Finally,we apply UTEM to an encryption mode TIE(tweak incrementation encryption)and an authenticated encryption mode IAPM(integrity aware parallelizable mode),present two new schemes TIE-plus and IAPM-plus,and prove their security.UTEM enriches tweakable blockciphers,brings more research topics,and plays an important role in modes of operation,which will be of great significance.展开更多
At ToSC 2019,Ankele et al.proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model.This paper further clarifies this principle and gives a search model for zero-correlat...At ToSC 2019,Ankele et al.proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model.This paper further clarifies this principle and gives a search model for zero-correlation distin-guishers.As a result,for the first time,the authors construct 14-round and 16-round zero-correlation linear distinguishers for SKINNY-n-2n and SKINNY-n-3n,respectively,which are both two rounds longer than Anekele et al.'s.Based on these distinguishers,the paper presents related-tweakey zero-correlation linear attacks on 21-round SKINNY-n-2n and 25-round SKINNY-n-3n,respectively.展开更多
针对硬盘加密的特定应用场景,设计并实现了快速硬盘加密算法FastDiskEnc。该算法是一种可扰乱的硬盘加密算法,实验结果表明,其性能在软件环境中比Windows Vista Bitlocker Driver Encryption所采用的算法提高了约20%。该算法具有伪完整...针对硬盘加密的特定应用场景,设计并实现了快速硬盘加密算法FastDiskEnc。该算法是一种可扰乱的硬盘加密算法,实验结果表明,其性能在软件环境中比Windows Vista Bitlocker Driver Encryption所采用的算法提高了约20%。该算法具有伪完整性保护能力。展开更多
基金supported by the National Key Research and Development Program of China(2019YFB2101704)National Natural Science Foundation of China(Grant Nos.61902195 and 62102196)NUPTSF(NY219131).
文摘The construction of the tweakable Even-Mansour cipher is in fact the designs of permutations,mask operations,and masking functions.For information-theoretic security,permutations are usually taken as random permutations.This paper focuses on the mask operations and masking functions to construct a universal tweakable Even-Mansour cipher.Firstly,we describe a formal definition of a universal masking function and provide a universal tweakable Even-Mansour cipher UTEM.In the random permutation model,we prove that UTEM is multi-key secure by H-coefficients technique.Then we show some efficient instantiations of the universal masking function to concertize UTEM.Finally,we apply UTEM to an encryption mode TIE(tweak incrementation encryption)and an authenticated encryption mode IAPM(integrity aware parallelizable mode),present two new schemes TIE-plus and IAPM-plus,and prove their security.UTEM enriches tweakable blockciphers,brings more research topics,and plays an important role in modes of operation,which will be of great significance.
基金sponsored by the Natural Science Foundation of Henan(No.222300420100)the Foundation of Key Laboratory of National Defense Science and Technology,China(61421030107).
文摘At ToSC 2019,Ankele et al.proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model.This paper further clarifies this principle and gives a search model for zero-correlation distin-guishers.As a result,for the first time,the authors construct 14-round and 16-round zero-correlation linear distinguishers for SKINNY-n-2n and SKINNY-n-3n,respectively,which are both two rounds longer than Anekele et al.'s.Based on these distinguishers,the paper presents related-tweakey zero-correlation linear attacks on 21-round SKINNY-n-2n and 25-round SKINNY-n-3n,respectively.