FastPRP: Fast Pseudo-Random Permutations for Small Domains
نویسندگان
چکیده
We propose a novel small-domain pseudo-random permutation, also referred to as a small-domain cipher or smalldomain (deterministic) encryption. We prove that our construction achieves “strong security”, i.e., is indistinguishable from a random permutation even when an adversary has observed all possible input-output pairs. More importantly, our construction is 1,000 to 8,000 times faster in most realistic scenarios, in comparison with the best known construction (also achieving strong security). Our implementation leverages the extended instruction sets of modern processors; and we also introduce a smart caching strategy to freely tune the tradeoff between time and space.
منابع مشابه
Óò×øöù Blockinøøòò È××ùùó¹êêòòóñ Èöñùøøøøóò× Ûûøø Èöö× Blockinööö
We show how to onstru t pseudo-random permutations that satisfy a ertain y le restri tion, for example that the permutation be y li ( onsisting of one y le ontaining all the elements) or an involution (a self-inverse permutation) with no xed points. The onstru tion an be based on any (unrestri ted) pseudo-random permutation. The resulting permutations are de ned su in tly and their evaluation a...
متن کاملOn the Construction of Pseudo-Random Permutations: Luby-Racko Revisited
Luby and Racko [27] showed a method for constructing a pseudo-random permutation from a pseudo-random function. The method is based on composing four (or three for weakened security) so called Feistel permutations, each of which requires the evaluation of a pseudo-random function. We reduce somewhat the complexity of the construction and simplify its proof of security by showing that two Feiste...
متن کاملPseudo-random Synthesizers, Functions and Permutations Doctor of Philosophy Constructions of Pseudo-random Functions Constructions of Pseudo-random Permutations a Study of Some Number-theoretical Assumptions
The research re ected in this dissertation is a study of (computational) pseudo-randomness. More speci cally, the main objective of this research is the e cient and simple construction of pseudo-random functions and permutations [62, 90], where e ciency refers both to the sequential and parallel time complexity of the computation. Pseudo-random functions and permutations are fundamental cryptog...
متن کاملGeneric Attacks for the Xor of k Random Permutations
Xoring the output of k permutations, k ≥ 2 is a very simple way to construct pseudo-random functions (PRF) from pseudo-random permutations (PRP). Moreover such construction has many applications in cryptography (see [2, 3, 4, 5] for example). Therefore it is interesting both from a theoretical and from a practical point of view, to get precise security results for this construction. In this pap...
متن کاملPseudo Random Synthesizers Functions and Permutations
The research re ected in this dissertation is a study of computational pseudo randomness More speci cally the main objective of this research is the e cient and simple construction of pseudo random functions and permutations where e ciency refers both to the sequential and parallel time complexity of the computation Pseudo random functions and permutations are fundamental cryptographic primitiv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012