Overview
Explore the intricacies of multi-key security and the Even-Mansour construction in this 22-minute conference talk. Delve into block cipher design, key scheduling, and related key settings before focusing on multi-key security in the context of Even-Mansour (EM) and Ideal Block Cipher (IBC) models. Compare these approaches and distinguish between multi-user and multi-key scenarios. Examine real-world examples of frequent rekeying and understand the advantages of the Even-Mansour construction. Gain valuable insights into advanced cryptographic concepts and their practical applications in modern security systems.
Syllabus
Outline
Block Cipher Design
Key Schedule
Related Key Setting
Multi Key Security Setting
Multi Key Security: Even Mansour (EM)
Multi Key Security: Ideal Block Cipher (IBC)
Multi Key Security: Comparison
Multi User vs Multi Key
Examples of Frequent Rekeying
Even Mansour: Advantages
Conclusion
Taught by
TheIACR