Cascade ciphers: The importance of being first

Springer Science and Business Media LLC - Tập 6 - Trang 55-61 - 1993
Ueli M. Maurer1, James L. Massey2
1Institute for Theoretical Computer Science, ETH Zürich, Zürich, Switzerland
2Institute for Signal and Information Processing, ETH Zürich, Zürich, Switzerland

Tóm tắt

The security of cascade ciphers, in which by definition the keys of the component ciphers are independent, is considered. It is shown by a counterexample that the intuitive result, formally stated and proved in the literature, that a cascade is at least as strong as the strongest component cipher, requires the uninterestingly restrictive assumption that the enemy cannot exploit information about the plaintext statistics. It is proved, for very general notions of breaking a cipher and of problem difficulty, that a cascade is at least as difficult to break as the first component cipher. A consequence of this result is that if the ciphers commute, then a cascade is at least as difficult to break as the most-difficult-to-break component cipher, i.e., the intuition that a cryptographic chain is at least as strong as its strongest link is then provably correct. It is noted that additive stream ciphers do commute, and this fact is used to suggest a strategy for designing secure practical ciphers. Other applications in cryptology are given of the arguments used to prove the cascade cipher result.

Tài liệu tham khảo

E. F. Brickell and K. S. McCurley, An interactive identification scheme based on discrete logarithms and factoring,Advances in Cryptology—Eurocrypt ’90 (ed. I. B. Damgaard), pp. 63–71, Lecture Notes in Computer Science, Vol. 473, Berlin: Springer-Verlag, 1991. W. Diffie and M. E. Hellman, Exhaustive cryptanalysis of the NBS Data Encryption Standard,IEEE Computer Magazine, Vol. 10, No. 6, June 1977, pp. 74–84. S. Even and O. Goldreich, On the power of cascade ciphers,ACM Transactions on Computer Systems, Vol. 3, 1985, pp. 108–116. K. S. McCurley, A key distribution system equivalent to factoring,Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 95–105. R. C. Merkle and M. E. Hellman, On the security of multiple encryption,Communications of the ACM, Vol. 24, No. 7, July 1981, pp. 465–467. C. E. Shannon, Communication theory of secrecy systems,Bell System Technical Journal, Vol. 28, Oct. 1949, pp. 656–715. A. C. Yao, Theory and applications of trapdoor functions,Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, IEEE, New York, 1982, pp. 80–91.