About the security of ciphers (semantic security and pseudo-random permutations)

Research output: Contribution to journalArticlepeer-review

Abstract

Probabilistic symmetric encryption have already been widely studied, from a theoretical point of view. Nevertheless, many applications require length-preserving encryption, to be patched at a minimal cost to include privacy without modifying the format (e.g. encrypted filesystems). In this paper, we thus consider the security notions for length-preserving, deterministic and symmetric encryption schemes, also termed ciphers: semantic security under lunchtime and challenge-adaptive adversaries. We furthermore provide some relations for this notion between different models of adversaries, and the more classical security notions for ciphers: pseudo-random permutations (PRP) and super pseudo-random permutations (SPRP).

Original languageEnglish
Pages (from-to)182-197
Number of pages16
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3357
DOIs
Publication statusPublished - 1 Jan 2004

Fingerprint

Dive into the research topics of 'About the security of ciphers (semantic security and pseudo-random permutations)'. Together they form a unique fingerprint.

Cite this