A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations - Information Security Theory and Practice: Securing the Internet of Things Access content directly
Conference Papers Year : 2014

A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations

Ju-Sung Kang
  • Function : Author
  • PersonId : 993982
Nayoung Kim
  • Function : Author
  • PersonId : 993983
Wangho Ju
  • Function : Author
  • PersonId : 993984
Ok-Yeon Yi
  • Function : Author
  • PersonId : 993985

Abstract

Within many cryptographic systems a key expansion function is used in order to derive more keying material from the master secret. The derived additional keys may be needed for multiple entities or for different cryptographic purposes such as privacy and authenticity. In this paper we wish to examine the soundness of the key expansion functions on the view point of provable security framework. Especially we focus on the key expansion functions using PRFs(pseudorandom functions) which are recommended by NIST, and show that the variant of Double-Pipeline Iteration mode using PRPs(pseudorandom permutations) is secure, while the variants of Counter and Feedback modes using PRPs are insecure. In practice secure block ciphers such as AES can be regarded as PRPs.
Fichier principal
Vignette du fichier
978-3-662-43826-8_2_Chapter.pdf (381.79 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01400917 , version 1 (22-11-2016)

Licence

Attribution

Identifiers

Cite

Ju-Sung Kang, Nayoung Kim, Wangho Ju, Ok-Yeon Yi. A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.10-23, ⟨10.1007/978-3-662-43826-8_2⟩. ⟨hal-01400917⟩
141 View
132 Download

Altmetric

Share

Gmail Facebook X LinkedIn More