International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

A Modular Approach to the Security Analysis of Two-Permutation Constructions

Authors:
Yu Long Chen , KU Leuven
Download:
Search ePrint
Search Google
Presentation: Slides
Conference: ASIACRYPT 2022
Abstract: Constructions based on two public permutation calls are very common in today's cryptographic community. However, each time a new construction is introduced, a dedicated proof must be carried out to study the security of the construction. In this work, we propose a new tool to analyze the security of these constructions in a modular way. This tool is built on the idea of the classical mirror theory for block cipher based constructions, such that it can be used for security proofs in the ideal permutation model. We present different variants of this public permutation mirror theory such that it is suitable for different security notions. We also present a framework to use the new techniques, which provides the bad events that need to be excluded in order to apply the public permutation mirror theory. Furthermore, we showcase the new technique on three examples: the Tweakable Even-Mansour cipher by Cogliati et al. (CRYPTO '15), the two permutation variant of the pEDM PRF by Dutta et al. (ToSC '21(2)), and the two permutation variant of the nEHtM_p MAC algorithm by Dutta and Nandi (AFRICACRYPT '20). With this new tool we prove the multi-user security of these constructions in a considerably simplified way.
Video from ASIACRYPT 2022
BibTeX
@inproceedings{asiacrypt-2022-32631,
  title={A Modular Approach to the Security Analysis of Two-Permutation Constructions},
  publisher={Springer-Verlag},
  author={Yu Long Chen},
  year=2022
}