Abstract. Two types of tweakable blockciphers based on classical blockciphers have been presented over the last years: non-tweak-rekeyable and tweak-rekeyable, depending on whether the tweak may influence the key input to the underlying blockcipher. In the former direction, the best possible security is conjectured to be 2σn/(σ+1),where n is the size of the blockcipher and σ is the number of blockcipher calls. In the latter direction, Mennink and Wang et al. presented optimally secure schemes, but only in the ideal cipher model. We investigate the possibility to construct a tweak-rekeyable cipher that achieves optimal security in the standard cipher model. As a first step, we note that all standard-model security results in literature implicitly rely on a generic standard-to-ideal transformation, that replaces all keyed blockcipher calls by random secret permutations, at the cost of the security of the blockcipher. Then, we prove that if this proof technique is adopted, tweak-rekeying will not help in achieving optimal security: if 2σn/(σ+1) is the best one can get without tweak-rekeying, optimal 2n provable security with tweak-rekeying is impossible.

, , , ,
Annual International Cryptology Conference
Centrum Wiskunde & Informatica, Amsterdam (CWI), The Netherlands

Mennink, B.J.M. (2017). Insuperability of the standard versus ideal model gap for tweakable blockcipher security. In Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence (pp. 708–732). doi:10.1007/978-3-319-63715-0_24