%0 Conference Proceedings %T A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations %+ Kookmin University [Seoul] %A Kang, Ju-Sung %A Kim, Nayoung %A Ju, Wangho %A Yi, Ok-Yeon %Z Part 2: Cryptography and Cryptanalysis %< avec comité de lecture %( Lecture Notes in Computer Science %B 8th IFIP International Workshop on Information Security Theory and Practice (WISTP) %C Heraklion, Crete, Greece %Y David Naccache %Y Damien Sauveron %I Springer %3 Information Security Theory and Practice. Securing the Internet of Things %V LNCS-8501 %P 10-23 %8 2014-06-30 %D 2014 %R 10.1007/978-3-662-43826-8_2 %K Privacy %K Authenticity %K Key expansion function %K Keying material %K Provable security %K Pseudorandomness %K PRF %K PRP %Z Computer Science [cs]Conference papers %X Within many cryptographic systems a key expansion function is used in order to derive more keying material from the master secret. The derived additional keys may be needed for multiple entities or for different cryptographic purposes such as privacy and authenticity. In this paper we wish to examine the soundness of the key expansion functions on the view point of provable security framework. Especially we focus on the key expansion functions using PRFs(pseudorandom functions) which are recommended by NIST, and show that the variant of Double-Pipeline Iteration mode using PRPs(pseudorandom permutations) is secure, while the variants of Counter and Feedback modes using PRPs are insecure. In practice secure block ciphers such as AES can be regarded as PRPs. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01400917/document %2 https://inria.hal.science/hal-01400917/file/978-3-662-43826-8_2_Chapter.pdf %L hal-01400917 %U https://inria.hal.science/hal-01400917 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-8501