Notes in Computer Science 5157

نویسندگان

  • Gerhard Goos
  • Juris Hartmanis
  • Jan van Leeuwen
  • David Hutchison
  • Josef Kittler
  • Jon M. Kleinberg
  • Gerhard Weikum
  • David Wagner
چکیده

The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed that security in the random oracle model implies security in the ideal cipher model; namely they showed that a random oracle can be replaced by a block cipher-based construction, and the resulting scheme remains secure in the ideal cipher model. The other direction was left as an open problem, i.e. constructing an ideal cipher from a random oracle. In this paper we solve this open problem and show that the Feistel construction with 6 rounds is enough to obtain an ideal cipher; we also show that 5 rounds are insufficient by providing a simple attack. This contrasts with the classical Luby-Rackoff result that 4 rounds are necessary and sufficient to obtain a (strong) pseudo-random permutation from a pseudo-random function.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tv and or Fm Transmitting Antennas Desien Using Computer Graphic System (RESEARCH NOTES)

The purpose of this paper is three fold. First, the major theoretical pattern relationships of TV and/or FM transmitting antennas are dealt with. Secend, the computer calculation method and designing of such patterns using the given relationships. And third, a method in which a computer graphic system can be used to design such antennas for a specific pattern is introduced and its results are p...

متن کامل

Some notes concerning the convergence control parameter in homotopy analysis method

omotopy analysis method (HAM) is a promising method for handling func-tional equations. Recent publications proved the eectiveness of HAM in solvingwide variety of problems in dierent elds. HAM has a unique property whichmakes it superior to other analytic methods, this property is its ability to con-trol the convergence region of the solution series. In this work, we claried theadvantages and ...

متن کامل

A Trusted Knowledge Management System for Multi-layer Threat Analysis

Multi-layer Threat Analysis Thanasis Petsas , Kazuya Okada , Hajime Tazaki , Gregory Blanc , and Pawel Pawliński 5 1 Institute of Computer Science, Foundation for Research and Technology—Hellas, Greece 2 Nara Institute of Science and Technology, Japan 3 The University of Tokyo, Japan 4 Institute Mines-Télécom / Télécom SudParis, CNRS UMR 5157 SAMOVAR, France 5 CERT Polska, Poland [email protected]...

متن کامل

Evidence of the Potential Shift Mechanism in Crevice Corrosion (RESEARCH NOTES)

Previous research has indicated a qualitative resemblance between the current distribution along actively corroding crevice walls and currents measured in corresponding anodic polarization plots. Using detailed measurements of the potential gradient along the crevice, a semi-quantitative current distribution was calculated for the crevice wall using a double numerical differentiation method. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008