The Random Oracle Model and the Ideal Cipher Model Are Equivalent View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2008-01-01

AUTHORS

Jean-Sébastien Coron , Jacques Patarin , Yannick Seurin

ABSTRACT

The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed that security in the random oracle model implies security in the ideal cipher model; namely they showed that a random oracle can be replaced by a block cipher-based construction, and the resulting scheme remains secure in the ideal cipher model. The other direction was left as an open problem, i.e. constructing an ideal cipher from a random oracle. In this paper we solve this open problem and show that the Feistel construction with 6 rounds is enough to obtain an ideal cipher; we also show that 5 rounds are insufficient by providing a simple attack. This contrasts with the classical Luby-Rackoff result that 4 rounds are necessary and sufficient to obtain a (strong) pseudo-random permutation from a pseudo-random function. More... »

PAGES

1-20

Book

TITLE

Advances in Cryptology – CRYPTO 2008

ISBN

978-3-540-85173-8
978-3-540-85174-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-85174-5_1

DOI

http://dx.doi.org/10.1007/978-3-540-85174-5_1

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1004027439


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Luxembourg", 
          "id": "http://www.grid.ac/institutes/grid.16008.3f", 
          "name": [
            "University of Luxembourg"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Coron", 
        "givenName": "Jean-S\u00e9bastien", 
        "id": "sg:person.014122543616.98", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014122543616.98"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Versailles", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "University of Versailles"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Patarin", 
        "givenName": "Jacques", 
        "id": "sg:person.012254315647.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012254315647.07"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Orange Labs", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "University of Versailles", 
            "Orange Labs"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seurin", 
        "givenName": "Yannick", 
        "id": "sg:person.011724731171.01", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2008-01-01", 
    "datePublishedReg": "2008-01-01", 
    "description": "The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed that security in the random oracle model implies security in the ideal cipher model; namely they showed that a random oracle can be replaced by a block cipher-based construction, and the resulting scheme remains secure in the ideal cipher model. The other direction was left as an open problem, i.e. constructing an ideal cipher from a random oracle. In this paper we solve this open problem and show that the Feistel construction with 6 rounds is enough to obtain an ideal cipher; we also show that 5 rounds are insufficient by providing a simple attack. This contrasts with the classical Luby-Rackoff result that 4 rounds are necessary and sufficient to obtain a (strong) pseudo-random permutation from a pseudo-random function.", 
    "editor": [
      {
        "familyName": "Wagner", 
        "givenName": "David", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-85174-5_1", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-85173-8", 
        "978-3-540-85174-5"
      ], 
      "name": "Advances in Cryptology \u2013 CRYPTO 2008", 
      "type": "Book"
    }, 
    "keywords": [
      "open problem", 
      "random oracle model", 
      "random oracles", 
      "security of cryptosystems", 
      "oracle model", 
      "pseudo-random function", 
      "pseudo-random permutation", 
      "Coron et al", 
      "problem", 
      "model", 
      "et al", 
      "computation", 
      "Crypto 2005", 
      "idealised model", 
      "oracle", 
      "scheme", 
      "simple attacks", 
      "permutations", 
      "construction", 
      "cryptosystem", 
      "cipher", 
      "ideal cipher", 
      "function", 
      "direction", 
      "al", 
      "results", 
      "cipher model", 
      "security", 
      "rounds", 
      "attacks", 
      "ideal cipher model", 
      "paper", 
      "Feistel construction"
    ], 
    "name": "The Random Oracle Model and the Ideal Cipher Model Are Equivalent", 
    "pagination": "1-20", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1004027439"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-85174-5_1"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-85174-5_1", 
      "https://app.dimensions.ai/details/publication/pub.1004027439"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:55", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_73.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-85174-5_1"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85174-5_1'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85174-5_1'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85174-5_1'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85174-5_1'


 

This table displays all metadata directly associated to this object as RDF triples.

111 TRIPLES      22 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-85174-5_1 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nad8c9a35a5ef4a869983ce6c9308f2a0
4 schema:datePublished 2008-01-01
5 schema:datePublishedReg 2008-01-01
6 schema:description The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed that security in the random oracle model implies security in the ideal cipher model; namely they showed that a random oracle can be replaced by a block cipher-based construction, and the resulting scheme remains secure in the ideal cipher model. The other direction was left as an open problem, i.e. constructing an ideal cipher from a random oracle. In this paper we solve this open problem and show that the Feistel construction with 6 rounds is enough to obtain an ideal cipher; we also show that 5 rounds are insufficient by providing a simple attack. This contrasts with the classical Luby-Rackoff result that 4 rounds are necessary and sufficient to obtain a (strong) pseudo-random permutation from a pseudo-random function.
7 schema:editor Nad319f3c69ef496d8e14cb742d1322dd
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Nb8bede914cd446a6ab07c4f6358ca23f
11 schema:keywords Coron et al
12 Crypto 2005
13 Feistel construction
14 al
15 attacks
16 cipher
17 cipher model
18 computation
19 construction
20 cryptosystem
21 direction
22 et al
23 function
24 ideal cipher
25 ideal cipher model
26 idealised model
27 model
28 open problem
29 oracle
30 oracle model
31 paper
32 permutations
33 problem
34 pseudo-random function
35 pseudo-random permutation
36 random oracle model
37 random oracles
38 results
39 rounds
40 scheme
41 security
42 security of cryptosystems
43 simple attacks
44 schema:name The Random Oracle Model and the Ideal Cipher Model Are Equivalent
45 schema:pagination 1-20
46 schema:productId Nb94615489d0c44a6aea1dc0413e3718d
47 Nc6c2755797a64aa19c722661ef8979c2
48 schema:publisher N83f415a320da48479462c95d8a33f969
49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004027439
50 https://doi.org/10.1007/978-3-540-85174-5_1
51 schema:sdDatePublished 2022-12-01T06:55
52 schema:sdLicense https://scigraph.springernature.com/explorer/license/
53 schema:sdPublisher N19faae5a30264fbaa2faaaaa37708928
54 schema:url https://doi.org/10.1007/978-3-540-85174-5_1
55 sgo:license sg:explorer/license/
56 sgo:sdDataset chapters
57 rdf:type schema:Chapter
58 N10ad8c5650bf40c5900c96a61661700b rdf:first sg:person.012254315647.07
59 rdf:rest Nd3ddc2411c864570932d3451911c5722
60 N19faae5a30264fbaa2faaaaa37708928 schema:name Springer Nature - SN SciGraph project
61 rdf:type schema:Organization
62 N83f415a320da48479462c95d8a33f969 schema:name Springer Nature
63 rdf:type schema:Organisation
64 N9419d9fdc9d74e1ba7c3157c1e2ead3f schema:familyName Wagner
65 schema:givenName David
66 rdf:type schema:Person
67 Nad319f3c69ef496d8e14cb742d1322dd rdf:first N9419d9fdc9d74e1ba7c3157c1e2ead3f
68 rdf:rest rdf:nil
69 Nad8c9a35a5ef4a869983ce6c9308f2a0 rdf:first sg:person.014122543616.98
70 rdf:rest N10ad8c5650bf40c5900c96a61661700b
71 Nb8bede914cd446a6ab07c4f6358ca23f schema:isbn 978-3-540-85173-8
72 978-3-540-85174-5
73 schema:name Advances in Cryptology – CRYPTO 2008
74 rdf:type schema:Book
75 Nb94615489d0c44a6aea1dc0413e3718d schema:name doi
76 schema:value 10.1007/978-3-540-85174-5_1
77 rdf:type schema:PropertyValue
78 Nc6c2755797a64aa19c722661ef8979c2 schema:name dimensions_id
79 schema:value pub.1004027439
80 rdf:type schema:PropertyValue
81 Nd3ddc2411c864570932d3451911c5722 rdf:first sg:person.011724731171.01
82 rdf:rest rdf:nil
83 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
84 schema:name Information and Computing Sciences
85 rdf:type schema:DefinedTerm
86 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
87 schema:name Data Format
88 rdf:type schema:DefinedTerm
89 sg:person.011724731171.01 schema:affiliation grid-institutes:None
90 schema:familyName Seurin
91 schema:givenName Yannick
92 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01
93 rdf:type schema:Person
94 sg:person.012254315647.07 schema:affiliation grid-institutes:None
95 schema:familyName Patarin
96 schema:givenName Jacques
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012254315647.07
98 rdf:type schema:Person
99 sg:person.014122543616.98 schema:affiliation grid-institutes:grid.16008.3f
100 schema:familyName Coron
101 schema:givenName Jean-Sébastien
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014122543616.98
103 rdf:type schema:Person
104 grid-institutes:None schema:alternateName Orange Labs
105 University of Versailles
106 schema:name Orange Labs
107 University of Versailles
108 rdf:type schema:Organization
109 grid-institutes:grid.16008.3f schema:alternateName University of Luxembourg
110 schema:name University of Luxembourg
111 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...