tweaks seems to be the password hashing salts of tweakable block ciphers:
- it can be public
- it randomizes the encryption even more
- it's cheap.
- 2002 - Moses Liskov and Ronald L. Rivest and David Wagner - Tweakable Block Ciphers
We propose a new cryptographic primitive, the “tweakable block cipher.” Such a cipher has not only the usual inputs—message and cryptographic key—but also a third input, the “tweak.” The tweak serves much the same purpose that an initialization vector does for CBC mode or that a nonce does for OCB mode. Our proposal thus brings this feature down to the primitive block-cipher level, instead of incorporating it only at the higher modes-of-operation levels. We suggest that
- tweakable block ciphers are easy to design
- the extra cost of making a block cipher “tweakable” is small
- it is easier to design and prove modes of operation based on tweakable block ciphers
Specifically, a tweakable block cipher should have the property that changing the tweak should be less costly than changing the key.
even if an adversary has control of the tweak input, we want the tweakable block cipher to remain secure
- 2016 - Ping Zhang and Honggang Hu - On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
- 2017 - Ping Zhang, Honggang Hu, and Peng Wang - Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption
- 2017 - Thorsten Kranz and Friedrich Wiemer and Gregor Leander - Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
- 2017 - Suvradip Chakraborty and Chester Rebeiro and Debdeep Mukhopadhyay and C. Pandu Rangan - Leakage-Resilient Tweakable Encryption from One-Way Functions
- 2017 - Bart Mennink - Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
- 2017 - Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin - ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
- 2017 - Yu Long Chen and Atul Luykx and Bart Mennink and Bart Preneel - Efficient Length Doubling From Tweakable Block Ciphers
- 2017 - Ashwin Jha and Eik List and Kazuhiko Minematsu and Sweta Mishra and Mridul Nandi - XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
- 2018 - Ritam Bhaumik and Eik List and Mridul Nandi - ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls
- 2009 - Kazuhiko Minematsu - Beyond-birthday-bound Security Based on Tweakable Block Cipher
- 2012 - Will Landecker and Thomas Shrimpton and R. Seth Terashima - Tweakable Blockciphers with Beyond Birthday-Bound Security
- 2015 - Benoît Cogliati and Yannick Seurin - Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- 2017 - Yusuke Naito - Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security](https://eprint.iacr.org/2017/466)
- 2018 - ByeongHak Lee and Jooyoung Lee - Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model
Tweakable block ciphers can either be designed from scratch, or be built upon off-the-shelf cryptographic primitives such as block ciphers and (public) permutations
- 2014 - Andrey Jivsov - WCFB: a tweakable wide block cipher
- 2018 - Benoît Cogliati and Jooyoung Lee - Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
- 2019 - Christof Beierle and Gregor Leander and Amir Moradi and Shahram Rasoolzadeh - CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
- 2016 - Guozhen Liu and Mohona Ghosh and Ling Song - Security Analysis of SKINNY under Related-Tweakey Settings
- 2017 - Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song - Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers
- 2017 - Maria Eichlseder and Daniel Kales - Clustering Related-Tweak Characteristics: Application to MANTIS-6
- 2018 - Rui Zong and Xiaoyang Dong and Xiaoyun Wang - MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC
- 2018 - Rui Zong and Xiaoyang Dong and Xiaoyun Wang - Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256
- 2019 - Muzhou Li and Kai Hu and Meiqin Wang - Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
- 2019 - Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo - Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion