The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs

@inproceedings{Bellare2006TheSO,
  title={The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs},
  author={Mihir Bellare and Phillip Rogaway},
  booktitle={EUROCRYPT},
  year={2006}
}
We show that, in the ideal-cipher model, triple encryption (the cascade of three independently-keyed blockciphers) is more secure than single or double encryption, thereby resolving a long-standing open problem. Our result demonstrates that for DES parameters (56-bit keys and 64-bit plaintexts) an adversary’s maximal advantage against triple encryption is small until it asks about 2 queries. Our proof uses codebased game-playing in an integral way, and is facilitated by a framework for such… CONTINUE READING
Highly Influential
This paper has highly influenced 43 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 378 extracted citations

Message-locked Encryption with File Update

IACR Cryptology ePrint Archive • 2018
View 7 Excerpts
Highly Influenced

Reasoning about Probabilistic Defense Mechanisms against Remote Attacks

2017 IEEE European Symposium on Security and Privacy (EuroS&P) • 2017
View 7 Excerpts
Highly Influenced

JHAE: An Authenticated Encryption Mode Based on JH

IACR Cryptology ePrint Archive • 2014
View 5 Excerpts
Highly Influenced

Optimality of non-adaptive strategies: The case of parallel games

2014 IEEE International Symposium on Information Theory • 2014
View 10 Excerpts
Highly Influenced

Triple and Quadruple Encryption: Bridging the Gaps

IACR Cryptology ePrint Archive • 2014
View 13 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 15 references

A plausible approach to computer-aided cryptographic proofs

IACR Cryptology ePrint Archive • 2005
View 1 Excerpt
Highly Influenced

A construction of a cipher from a single pseudorandom permutation

Journal of Cryptology • 1997
View 2 Excerpts
Highly Influenced

Communication theory of secrecy systems

C. Shannon
Bell Systems Technical Journal, vol. 28, no. 4, pp. 656–715, • 1949
View 1 Excerpt
Highly Influenced

Sequences of games: a tool for taming complexity in security proofs

IACR Cryptology ePrint Archive • 2004
View 1 Excerpt

Attacking Triple Encryption

FSE • 1998
View 1 Excerpt

Similar Papers

Loading similar papers…