The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

Security of Hash-then-CBC Key Wrapping Revisited

Yasushi OSAKI, Tetsu IWATA

  • Full Text Views

    0

  • Cite this

Summary :

Key wrapping schemes are used to encrypt data of high entropy, such as cryptographic keys. There are two known security definitions for key wrapping schemes. One captures the security against chosen plaintext attacks (called DAE-security), and the other captures known plaintext attacks (called AKW-security). In this paper, we revisit the security of Hash-then-CBC key wrapping schemes. In [17], Osaki and Iwata showed that the UCC-then-CBC key wrapping scheme, a key wrapping scheme that uses the UCC hash function and CBC mode, has provable AKW-security. In this paper, we show that the scheme achieves the stronger notion of DAE-security. We also show our proof in the variable input length setting, where the adversary is allowed making queries of varying lengths. Furthermore, we consider the scheme that incorporates the use of headers. To handle such a setting, we generalize the previous definition of the UCC hash function to the variable input length setting and to take the header as its input, and show an efficient construction that meets the definition.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E96-A No.1 pp.25-34
Publication Date
2013/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E96.A.25
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Symmetric Key Cryptography

Authors

Keyword