Security in O(2) for the Xor of Two Random Permutations – Proof with the standard H technique–
نویسنده
چکیده
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H technique” instead of the “Hσ technique”. It will be interesting to compare the two techniques, their similarities and the differences between the proofs and the results.
منابع مشابه
Security in O(2n) for the Xor of Two Random Permutations \\ - Proof with the standard H technique -
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H tec...
متن کاملA Proof of Security in O(2) for the Xor of Two Random Permutations – Proof with the “Hσ technique”–
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction. Since such construction has many applications in cryptography (see [2, 3, 4, 6] for example), this problem is interesting both from a theoretical and from a practical point of view. In [6], it was proved ...
متن کاملA Proof of Security in O(2) for the Xor of Two Random Permutations
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction. Since such construction has many applications in cryptography (see [2–4, 6] for example), this problem is interesting both from a theoretical and from a practical point of view. In [6], it was proved that...
متن کاملA Proof of Security in O(2n) for the Xor of Two Random Permutations
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction. Since such construction has many applications in cryptography (see [2, 3, 4, 6] for example), this problem is interesting both from a theoretical and from a practical point of view. In [6], it was proved ...
متن کاملOn the XOR of Multiple Random Permutations
A straightforward way of constructing an n-bit pseudorandom function is to XOR two or more pseudorandom permutations: p1 ⊕ . . .⊕pk. This XOR construction has gained broad attention over the last two decades. In this work, we revisit the security of this well-established construction. We consider the case where the underlying permutations are considered secret, as well as the case where these p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013