Abstract
This work initiates a study of Luby-Racko. ciphers when the bitwise exclusive-or (XOR) operation in the underlying Feistel network is replaced by a binary operation in an arbitrary finite group. We obtain various interesting results in this context: - First, we analyze the security of three-round Feistel ladders over arbitrary groups. We examine various Luby-Racko. ciphers known to be insecure when XOR is used. In some cases, we can break these ciphers over arbitrary Abelian groups and in other cases, however, the security remains an open problem. - Next, we construct a four round Luby-Racko. cipher, operating over finite groups of characteristic greater than 2, that is not only completely secure against adaptive chosen plaintext and ciphertext attacks, but has better time / space complexity and uses fewer random bits than all previously considered Luby-Racko. ciphers of equivalent security in the literature. Surprisingly, when the group is of characteristic 2 (i.e., the underlying operation on strings is bitwise exclusive-or), the cipher can be completely broken in a constant number of queries. Notably, for the former set of results dealing with three rounds (where we report no difference) we need new techniques. However for the latter set of results dealing with four rounds (where we prove a new theorem) we rely on a generalization of known techniques albeit requires a new type of hash function family, called a monosymmetric hash function family, which we introduce in this work. We also discuss the existence (and construction) of this function family over various groups, and argue the necessity of this family in our construction. Moreover, these functions can be very easily and efficiently implemented on most current microprocessors thereby rendering the four round construction very practical.
Work done while this author was at Lucent Technologies and the Massachusetts Institute of Technology. This author would like to acknowledge DARPA grant DABT63- 96-C-0018 and an NSF graduate fellowship.
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
M. Bellare, J. Kilian, and P. Rogaway. The security of cipher block chaining. In Yvo G. Desmedt, editor, Advances in Cryptology-CRYPTO’ 94, volume 839 of Lecture Notes in Computer Science, pages 341–358. Springer-Verlag, 21-25 August 1994.
E. R. Berlekamp. Factoring polynomials over large finite fields. Mathematics of Computation, 24:713–735, 1970.
E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer Verlag, 1993. ISBN: 0-387-97930-1, 3-540-97930.
G. Carter, E. Dawson, and L. Nielsen. DESV: A Latin Square variation of DES. In Proceeding of Workshop on Selected Areas of Cryptography, 1995.
M. Etzel, S. Patel, and Z. Ramzan. Square hash: Fast message authentication via optimized universal hash functions. In Proc. CRYPTO 99, Lecture Notes in Computer Science. Springer-Verlag, 1999.
M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman, 1979.
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4):792–807, October 1986.
I. N. Herstein. Topics in Algebra. Blaisdell Publishing Company, 1964.
R. Karp. Reducibility among combinatorial problems. in Complexity of Computer Computations, 1972.
M. Luby and C. Racko.. How to construct pseudorandom permutations and pseudorandom functions. SIAM J. Computing, 17(2):373–386, April 1988.
M. Naor and O. Reingold. On the construction of pseudo-random permutations: Luby-Racko. revisited. J. of Cryptology, 12:29–66, 1999. Preliminary version in:Proc. STOC 97.
J. Patarin. New results on pseudorandom permutation generators based on the DES scheme. In Proc. CRYPTO 91, Lecture Notes in Computer Science. Springer-Verlag, 1991.
J. Patarin. Improved security bounds for pseudorandom permutations. In 4th ACM Conference on Computer and Communications Security, pages 140–150, 1997.
S. Patel, Z. Ramzan, and G. Sundaram. Towards making Luby-Racko. ciphers optimal and practical. In Proc. Fast Software Encryption 99, Lecture Notes in Computer Science. Springer-Verlag, 1999.
R. A. Rueppel. On the security of Schnorr’s pseudo random generator. In Proc. EUROCRYPT 89, Lecture Notes in Computer Science. Springer-Verlag, 1989.
D. R. Stinson. Comments on definitions of universal hash families, August 2000. Available from: http://cacr.math.uwaterloo.ca/~dstinson/.
Y. Zheng, T. Matsumoto, and H. Imai. Impossibility and optimality results on constructing pseudorandom permutations. In Proc. EUROCRYPT 89, Lecture Notes in Computer Science. Springer-Verlag, 1989.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Patel, S., Ramzan, Z., Sundaram, G.S. (2003). Luby-Racko. Ciphers: Why XOR Is Not So Exclusive. In: Nyberg, K., Heys, H. (eds) Selected Areas in Cryptography. SAC 2002. Lecture Notes in Computer Science, vol 2595. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36492-7_18
Download citation
DOI: https://doi.org/10.1007/3-540-36492-7_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00622-0
Online ISBN: 978-3-540-36492-4
eBook Packages: Springer Book Archive