New Results on the Pseudorandomness of Some Blockcipher Constructions View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2002-06-21

AUTHORS

Henri Gilbert , Marine Minier

ABSTRACT

In this paper, we describe new results on the security, in the Luby-Rackoff paradigm, of two modified Feistel constructions, namely the L-scheme, a construction used at various levels of the MISTY block-cipher which allows to derive a 2n-bit permutation from several n-bit permutations, and a slightly different construction named the R-scheme. We obtain pseudorandomness and super-pseudorandomness proofs for L-schemes and R-schemes with a sufficient number of rounds, which extend the pseudorandomness and non superpseudorandomness results on the 4-round L-scheme previously established by Sugita [Su96] and Sakurai et al. [Sa97]. In particular, we show that unlike the 3-round L-scheme, the 3-round R-scheme is pseudorandom, and that both the 5-round L scheme and the 5-round R scheme are super pseudorandom (whereas the 4 round versions of both schemes are not super pseudorandom). The security bounds obtained here are close to those established by Luby and Rackoff for the three round version of the original Feistel scheme. More... »

PAGES

248-266

Book

TITLE

Fast Software Encryption

ISBN

978-3-540-43869-4
978-3-540-45473-1

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-45473-x_21

DOI

http://dx.doi.org/10.1007/3-540-45473-x_21

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1018815124


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "France T\u00e9l\u00e9com R&D, 38-40, rue du G\u00e9n\u00e9ral Leclerc, 92794, Issy les Moulineaux Cedex 9, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France T\u00e9l\u00e9com R&D, 38-40, rue du G\u00e9n\u00e9ral Leclerc, 92794, Issy les Moulineaux Cedex 9, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gilbert", 
        "givenName": "Henri", 
        "id": "sg:person.012771236207.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "France T\u00e9l\u00e9com R&D, 38-40, rue du G\u00e9n\u00e9ral Leclerc, 92794, Issy les Moulineaux Cedex 9, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France T\u00e9l\u00e9com R&D, 38-40, rue du G\u00e9n\u00e9ral Leclerc, 92794, Issy les Moulineaux Cedex 9, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Minier", 
        "givenName": "Marine", 
        "id": "sg:person.011575127075.64", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011575127075.64"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2002-06-21", 
    "datePublishedReg": "2002-06-21", 
    "description": "In this paper, we describe new results on the security, in the Luby-Rackoff paradigm, of two modified Feistel constructions, namely the L-scheme, a construction used at various levels of the MISTY block-cipher which allows to derive a 2n-bit permutation from several n-bit permutations, and a slightly different construction named the R-scheme. We obtain pseudorandomness and super-pseudorandomness proofs for L-schemes and R-schemes with a sufficient number of rounds, which extend the pseudorandomness and non superpseudorandomness results on the 4-round L-scheme previously established by Sugita [Su96] and Sakurai et al. [Sa97]. In particular, we show that unlike the 3-round L-scheme, the 3-round R-scheme is pseudorandom, and that both the 5-round L scheme and the 5-round R scheme are super pseudorandom (whereas the 4 round versions of both schemes are not super pseudorandom). The security bounds obtained here are close to those established by Luby and Rackoff for the three round version of the original Feistel scheme.", 
    "editor": [
      {
        "familyName": "Matsui", 
        "givenName": "Mitsuru", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-45473-x_21", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-43869-4", 
        "978-3-540-45473-1"
      ], 
      "name": "Fast Software Encryption", 
      "type": "Book"
    }, 
    "keywords": [
      "L-scheme", 
      "new results", 
      "R scheme", 
      "Sakurai et al", 
      "Feistel schemes", 
      "pseudorandomness", 
      "security bounds", 
      "scheme", 
      "permutations", 
      "n-bit permutations", 
      "bounds", 
      "different constructions", 
      "et al", 
      "sufficient number", 
      "Rackoff", 
      "Luby", 
      "pseudorandom", 
      "construction", 
      "proof", 
      "Sugita", 
      "results", 
      "version", 
      "round version", 
      "number", 
      "al", 
      "paradigm", 
      "security", 
      "rounds", 
      "levels", 
      "Misty", 
      "paper", 
      "Feistel construction"
    ], 
    "name": "New Results on the Pseudorandomness of Some Blockcipher Constructions", 
    "pagination": "248-266", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1018815124"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-45473-x_21"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-45473-x_21", 
      "https://app.dimensions.ai/details/publication/pub.1018815124"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:46", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_124.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-45473-x_21"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-45473-x_21'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-45473-x_21'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-45473-x_21'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-45473-x_21'


 

This table displays all metadata directly associated to this object as RDF triples.

98 TRIPLES      22 PREDICATES      56 URIs      49 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-45473-x_21 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N643610e142ed4fdd9a89f4be416d07e0
4 schema:datePublished 2002-06-21
5 schema:datePublishedReg 2002-06-21
6 schema:description In this paper, we describe new results on the security, in the Luby-Rackoff paradigm, of two modified Feistel constructions, namely the L-scheme, a construction used at various levels of the MISTY block-cipher which allows to derive a 2n-bit permutation from several n-bit permutations, and a slightly different construction named the R-scheme. We obtain pseudorandomness and super-pseudorandomness proofs for L-schemes and R-schemes with a sufficient number of rounds, which extend the pseudorandomness and non superpseudorandomness results on the 4-round L-scheme previously established by Sugita [Su96] and Sakurai et al. [Sa97]. In particular, we show that unlike the 3-round L-scheme, the 3-round R-scheme is pseudorandom, and that both the 5-round L scheme and the 5-round R scheme are super pseudorandom (whereas the 4 round versions of both schemes are not super pseudorandom). The security bounds obtained here are close to those established by Luby and Rackoff for the three round version of the original Feistel scheme.
7 schema:editor N4aa67be22f0a4956a32419448a902c9d
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N203653fd19414ac795a44fe445374963
11 schema:keywords Feistel construction
12 Feistel schemes
13 L-scheme
14 Luby
15 Misty
16 R scheme
17 Rackoff
18 Sakurai et al
19 Sugita
20 al
21 bounds
22 construction
23 different constructions
24 et al
25 levels
26 n-bit permutations
27 new results
28 number
29 paper
30 paradigm
31 permutations
32 proof
33 pseudorandom
34 pseudorandomness
35 results
36 round version
37 rounds
38 scheme
39 security
40 security bounds
41 sufficient number
42 version
43 schema:name New Results on the Pseudorandomness of Some Blockcipher Constructions
44 schema:pagination 248-266
45 schema:productId N175874ae72d3465e9c0e1e4afc4c9a3a
46 N25d4c4a63c474d45ae583582e99714bb
47 schema:publisher Nb7ed2af3f54c45acaa7a2e4340a8fe2b
48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018815124
49 https://doi.org/10.1007/3-540-45473-x_21
50 schema:sdDatePublished 2022-12-01T06:46
51 schema:sdLicense https://scigraph.springernature.com/explorer/license/
52 schema:sdPublisher N3785dece979e4817a37d45f961d68fbd
53 schema:url https://doi.org/10.1007/3-540-45473-x_21
54 sgo:license sg:explorer/license/
55 sgo:sdDataset chapters
56 rdf:type schema:Chapter
57 N175874ae72d3465e9c0e1e4afc4c9a3a schema:name dimensions_id
58 schema:value pub.1018815124
59 rdf:type schema:PropertyValue
60 N203653fd19414ac795a44fe445374963 schema:isbn 978-3-540-43869-4
61 978-3-540-45473-1
62 schema:name Fast Software Encryption
63 rdf:type schema:Book
64 N25d4c4a63c474d45ae583582e99714bb schema:name doi
65 schema:value 10.1007/3-540-45473-x_21
66 rdf:type schema:PropertyValue
67 N3785dece979e4817a37d45f961d68fbd schema:name Springer Nature - SN SciGraph project
68 rdf:type schema:Organization
69 N4aa67be22f0a4956a32419448a902c9d rdf:first N8219f4c86413449da8460b7f343d7be0
70 rdf:rest rdf:nil
71 N5351b87f46bd48829845896e7f4a95c9 rdf:first sg:person.011575127075.64
72 rdf:rest rdf:nil
73 N643610e142ed4fdd9a89f4be416d07e0 rdf:first sg:person.012771236207.08
74 rdf:rest N5351b87f46bd48829845896e7f4a95c9
75 N8219f4c86413449da8460b7f343d7be0 schema:familyName Matsui
76 schema:givenName Mitsuru
77 rdf:type schema:Person
78 Nb7ed2af3f54c45acaa7a2e4340a8fe2b schema:name Springer Nature
79 rdf:type schema:Organisation
80 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information and Computing Sciences
82 rdf:type schema:DefinedTerm
83 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
84 schema:name Data Format
85 rdf:type schema:DefinedTerm
86 sg:person.011575127075.64 schema:affiliation grid-institutes:grid.89485.38
87 schema:familyName Minier
88 schema:givenName Marine
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011575127075.64
90 rdf:type schema:Person
91 sg:person.012771236207.08 schema:affiliation grid-institutes:grid.89485.38
92 schema:familyName Gilbert
93 schema:givenName Henri
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08
95 rdf:type schema:Person
96 grid-institutes:grid.89485.38 schema:alternateName France Télécom R&D, 38-40, rue du Général Leclerc, 92794, Issy les Moulineaux Cedex 9, France
97 schema:name France Télécom R&D, 38-40, rue du Général Leclerc, 92794, Issy les Moulineaux Cedex 9, France
98 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...