FastPRP: Fast Pseudo-Random Permutations for Small Domains

نویسندگان

  • Emil Stefanov
  • Elaine Shi
چکیده

We propose a novel small-domain pseudo-random permutation, also referred to as a small-domain cipher or smalldomain (deterministic) encryption. We prove that our construction achieves “strong security”, i.e., is indistinguishable from a random permutation even when an adversary has observed all possible input-output pairs. More importantly, our construction is 1,000 to 8,000 times faster in most realistic scenarios, in comparison with the best known construction (also achieving strong security). Our implementation leverages the extended instruction sets of modern processors; and we also introduce a smart caching strategy to freely tune the tradeoff between time and space.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Óò×øöù Blockinøøòò È××ùùó¹êêòòóñ Èöñùøøøøóò× Ûûøø Èöö× Blockinööö

We show how to onstru t pseudo-random permutations that satisfy a ertain y le restri tion, for example that the permutation be y li ( onsisting of one y le ontaining all the elements) or an involution (a self-inverse permutation) with no xed points. The onstru tion an be based on any (unrestri ted) pseudo-random permutation. The resulting permutations are de ned su in tly and their evaluation a...

متن کامل

On the Construction of Pseudo-Random Permutations: Luby-Racko Revisited

Luby and Racko [27] showed a method for constructing a pseudo-random permutation from a pseudo-random function. The method is based on composing four (or three for weakened security) so called Feistel permutations, each of which requires the evaluation of a pseudo-random function. We reduce somewhat the complexity of the construction and simplify its proof of security by showing that two Feiste...

متن کامل

Pseudo-random Synthesizers, Functions and Permutations Doctor of Philosophy Constructions of Pseudo-random Functions Constructions of Pseudo-random Permutations a Study of Some Number-theoretical Assumptions

The research re ected in this dissertation is a study of (computational) pseudo-randomness. More speci cally, the main objective of this research is the e cient and simple construction of pseudo-random functions and permutations [62, 90], where e ciency refers both to the sequential and parallel time complexity of the computation. Pseudo-random functions and permutations are fundamental cryptog...

متن کامل

Generic Attacks for the Xor of k Random Permutations

Xoring the output of k permutations, k ≥ 2 is a very simple way to construct pseudo-random functions (PRF) from pseudo-random permutations (PRP). Moreover such construction has many applications in cryptography (see [2, 3, 4, 5] for example). Therefore it is interesting both from a theoretical and from a practical point of view, to get precise security results for this construction. In this pap...

متن کامل

Pseudo Random Synthesizers Functions and Permutations

The research re ected in this dissertation is a study of computational pseudo randomness More speci cally the main objective of this research is the e cient and simple construction of pseudo random functions and permutations where e ciency refers both to the sequential and parallel time complexity of the computation Pseudo random functions and permutations are fundamental cryptographic primitiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012