A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation

A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation

August 15, 1997 | M. BELLARE*, A. DESAI*, E. JOKIPII*, P. ROGAWAY†
This paper provides a comprehensive analysis of symmetric encryption schemes in the context of concrete security. The authors, M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, study four different notions of security against chosen plaintext attacks: real-or-random indistinguishability, left-or-right indistinguishability, find-then-guess security, and semantic security. They analyze the complexity of reductions between these notions, establishing both upper and lower bounds to classify them as stronger or weaker in terms of concrete security. The paper also includes a detailed analysis of specific symmetric encryption schemes, focusing on the CBC (Cipher Block Chaining) and XOR modes. For the XOR scheme, both probabilistic and stateful versions are considered. The authors derive tight bounds on the success probability of adversaries as a function of their resources, demonstrating that the stateful XOR scheme based on a finite pseudorandom function has the best security properties. The paper concludes by discussing the implications of these findings for the design and analysis of symmetric encryption schemes, emphasizing the importance of concrete security in practical applications.This paper provides a comprehensive analysis of symmetric encryption schemes in the context of concrete security. The authors, M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, study four different notions of security against chosen plaintext attacks: real-or-random indistinguishability, left-or-right indistinguishability, find-then-guess security, and semantic security. They analyze the complexity of reductions between these notions, establishing both upper and lower bounds to classify them as stronger or weaker in terms of concrete security. The paper also includes a detailed analysis of specific symmetric encryption schemes, focusing on the CBC (Cipher Block Chaining) and XOR modes. For the XOR scheme, both probabilistic and stateful versions are considered. The authors derive tight bounds on the success probability of adversaries as a function of their resources, demonstrating that the stateful XOR scheme based on a finite pseudorandom function has the best security properties. The paper concludes by discussing the implications of these findings for the design and analysis of symmetric encryption schemes, emphasizing the importance of concrete security in practical applications.
Reach us at info@study.space