Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/11761679_25guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The security of triple encryption and a framework for code-based game-playing proofs

Published: 28 May 2006 Publication History

Abstract

We show that, in the ideal-cipher model, triple encryption (the cascade of three independently-keyed blockciphers) is more secure than single or double encryption, thereby resolving a long-standing open problem. Our result demonstrates that for DES parameters (56-bit keys and 64-bit plaintexts) an adversary's maximal advantage against triple encryption is small until it asks about 278 queries. Our proof uses code-based game-playing in an integral way, and is facilitated by a framework for such proofs that we provide.

References

[1]
W. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan. Security amplification by composition: the case of doubly-iterated, ideal ciphers. Advances in Cryptology -- CRYPTO '98, Lecture Notes in Computer Science, vol 1462, Springer, pp. 390-407, 1998.
[2]
M. Bellare and S. Goldwasser. New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs. Advances in Cryptology -- CRYPTO '89, Lecture Notes in Computer Science, vol. 435, Springer, pp. 194-211, 1990.
[3]
M. Bellare and P. Rogaway. Code-based game-playing proofs and the security of triple encryption. Cryptology ePrint archive report 2004/331, 2006.
[4]
W. Diffie and M. Hellman. Exhaustive cryptanalysis of the data encryption standard. Computer, vol. 10, pp. 74-84, 1977.
[5]
S. Even and O. Goldreich. On the power of cascade ciphers. ACM Transactions on Computer Systems, vol. 3, no. 2, pp. 108-116, 1985.
[6]
S. Even and Y. Mansour. A construction of a cipher from a single pseudorandom permutation. Advances in Cryptology -- ASIACRYPT '91, Lecture Notes in Computer Science, vol.739, Springer, pp. 210-224, 1993.
[7]
S. Goldwasser and S. Micali. Probabilistic encryption. J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984. Earlier version in STOC '82.
[8]
S. Halevi. A plausible approach to computer-aided cryptographic proofs. Cryptology ePrint archive report 2005/181, 2005.
[9]
J. Kilian and P. Rogaway. How to protect DES against exhaustive key search (an analysis of DESX). J. of Cryptology, vol. 14, no. 1, pp. 17-35, 2001. Earlier version in Crypto '96.
[10]
S. Lucks. Attacking triple encryption. Fast Software Encryption (FSE '98), Lecture Notes in Computer Science, vol. 1372, Springer, pp. 239-253, 1998.
[11]
U. Maurer and J. Massey. Cascade ciphers: the importance of being first. J. of Cryptology, vol. 6, no. 1, pp. 55-61, 1993.
[12]
R. Merkle and M. Hellman. On the security of multiple encryption. Communications of the ACM, vol. 24, pp. 465-467, 1981.
[13]
National Institute of Standards and Technology. FIPS PUB 46-3, Data Encryption Standard (DES), 1999. Also ANSI X9.52, Triple Data Encryption Algorithm modes of operation, 1998, and other standards.
[14]
C. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.
[15]
V. Shoup. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint archive report 2004/332, 2006.
[16]
A. Yao. Theory and applications of trapdoor functions. IEEE Symposium on the Foundations of Computer Science (FOCS 1982), IEEE Press, pp. 80-91, 1982.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
EUROCRYPT'06: Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
May 2006
611 pages
ISBN:3540345469

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 28 May 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media