 Hello everyone, my name is Yu-Long Chen, and welcome to my abstract presentation of my paper, Profit Secure Reflection Ciphers. So this is a joint work with Tim Baylor. Cryptography has long been fascinated by the self-inverse property of the encryption devices. The example is an Enigma Roto machine where the encryption and the decryption operations are identical. This is enabled by the middle reflector, which makes encryption device much more complex. This self-inverse property can also be found in the modern ciphers. For example, the ciphers that's based on the FISO network, the famous example is the desktop cipher. So a special property of those FISO ciphers is that decryption is always possible, which is equal to encryption using one keys in the reverse order. This property makes the fact that underlying odd functions do not need to be invertible anymore, which gives us much more flexibility when we need to choose those front functions. Now, another property is that the input screen is not the entire input screen is updated every once. So we can see from the slide on your part of the input screen is updated using the RON function. The generic security of the FISO ciphers is first stopped in 1985. Another class of another important class of the ciphers is designed using the so-called t-alternating cipher structure. The famous example is the AS block sign. Here the authors were inspired by Schoen's idea, and the t-alternating ciphers have the property that they usually require less front and back signs. For example, there's only 10 blocks needed for 128-bit keys AS, while 16 blocks are needed for the desk block sign. Another property is fast diffusion, since the entire bit screen is updated every once. Now, the limitation of the key-alternating ciphers is such that they do not have self-interest property like the FISO ciphers. The generic security of the key-alternating ciphers was first started by Egan Tarsu in 1991, where the single round case went by Bokhtangor Fertol in 2012 for the beautiful round case. Now, as mentioned before, both the FISO ciphers and the t-alternating ciphers have their own advantage and their limitations. The question now is whether we can combine those two ideas and get a new design structure such that it's similar to the key-alternating cipher structure, such that less front are needed to design a secure cipher while still obtaining the self-interest property of the FISO ciphers. The answer is given by Bokhtangor Fertol in 2012, where they would use a fringe refraction sign. The cipher is based on the following structure which shows on the slide. We call this design structure the key-alternating refraction sign. So, a cipher space on the structure as a following refraction property, namely, decryption is always equal to encryption using related keys. Because of this special property, the refraction ciphers are in particular suitable for low-latency, low-arrowing use cases. However, until now, there's no study performed on the generic security of the refraction ciphers. Therefore, in this work, we initialize for the first time the study of the generic security of the key-alternating refraction ciphers. Based on the results, we reduced our results to design new key-led extender that can be used for practical refraction ciphers such as fringe models. The full version of this presentation can be found in crypto 2022. Thank you for your attention.