Perturbing and protecting a traceable block cipher

  • Authors:
  • Julien Bringer;Hervé Chabanne;Emmanuelle Dottax

  • Affiliations:
  • Sagem Défense Sécurité;Sagem Défense Sécurité;Sagem Défense Sécurité

  • Venue:
  • CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

At the Asiacrypt 2003 conference, Billet and Gilbert introduce a block cipher, which, to quote them, has the following paradoxical property: it is computationally easy to derive many equivalent distinct descriptions of the same instance of the block cipher; but it is computationally difficult, given one or even many of them, to recover the so-called meta-key from which they were derived, or to find any additional equivalent description, or more generally to forge any new untraceable description of the same instance of the block cipher. They exploit this property to introduce the first traceable block cipher. Their construction relies on the Isomorphism of Polynomials (IP) problem. At Eurocrypt 2006, Faugère and Perret show how to break this scheme by algebraic attack. We here strengthen the original traceable block cipher against this attack by concealing the underlying IP problems. Our modification is such that our description of the block cipher now does not give the expected results all the time and parallel executions are used to obtain the correct value.