Security in O(2) for the Xor of Two Random Permutations – Proof with the standard H technique–

نویسنده

  • Jacques Patarin
چکیده

Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H technique” instead of the “Hσ technique”. It will be interesting to compare the two techniques, their similarities and the differences between the proofs and the results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in O(2n) for the Xor of Two Random Permutations \\ - Proof with the standard H technique -

Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H tec...

متن کامل

A Proof of Security in O(2) for the Xor of Two Random Permutations – Proof with the “Hσ technique”–

Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction. Since such construction has many applications in cryptography (see [2, 3, 4, 6] for example), this problem is interesting both from a theoretical and from a practical point of view. In [6], it was proved ...

متن کامل

A Proof of Security in O(2) for the Xor of Two Random Permutations

Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction. Since such construction has many applications in cryptography (see [2–4, 6] for example), this problem is interesting both from a theoretical and from a practical point of view. In [6], it was proved that...

متن کامل

A Proof of Security in O(2n) for the Xor of Two Random Permutations

Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction. Since such construction has many applications in cryptography (see [2, 3, 4, 6] for example), this problem is interesting both from a theoretical and from a practical point of view. In [6], it was proved ...

متن کامل

On the XOR of Multiple Random Permutations

A straightforward way of constructing an n-bit pseudorandom function is to XOR two or more pseudorandom permutations: p1 ⊕ . . .⊕pk. This XOR construction has gained broad attention over the last two decades. In this work, we revisit the security of this well-established construction. We consider the case where the underlying permutations are considered secret, as well as the case where these p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013