← Back to projects

Theoretical Foundations of Block Ciphers

Project overview

Block ciphers are the workhorses of modern cryptography. An overwhelming fraction of the Internet traffic is encrypted and secured using the Advanced Encryption Standard (AES), a block cipher; the same goes for encrypted file systems, encrypted messaging, and several other applications that we use in our everyday life. This research theme aims to advance the foundational understanding of the security of block ciphers such as AES.

For one, we have the formidable machinery of theoretical cryptography which aims to reduce the security of cryptographic constructions (such as AES) to the hardness of well-studied computational and mathematical problems. However, AES derives its security from iterating several times a simple permutation which, by itself, does not have any discernible cryptographic hardness. Thus, the reductionist machinery gets stuck right off the bat: What even is a mathematical problem from which to deduce the security of AES?

Secondly, a different line of work analyzes constructions in idealized models where certain components are treated as public random primitives, a classical example being the analysis of the Even-Mansour construction of a block cipher from a public ideal random permutation. While insightful, this scenario is far from what happens in the design of AES: the only non-linear component in AES is the 8-bit S-box which essentially computes the inverse function over the finite field $\mathbb{F}_{2^8}$. This is decidedly not a random permutation with an exponentially large domain, something that all such analyses (to our knowledge) assume.

Finally, the cryptanalytic community has come up with an extensive body of attacks including linear and differential attacks, higher-order attacks, and algebraic attacks. These attacks have so far failed to make a dent in the conjectured security of AES as a pseudorandom permutation (except for limited results in the case of reduced-round variants, or in non-standard settings such as related-key attacks). While this is perhaps great news (so far) for the practice of cryptography, it is still entirely possible that a small, clever, variant of known attacks breaks AES in a devastating way.

We explore a different, bottom-up, approach. Our goal is to analyze existing construction paradigms for block ciphers as well as design new ones that enjoy rigorous proofs of security against specific, yet powerful and commonly deployed classes of attacks.

Publications