Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract)

نویسندگان

  • Yuliang Zheng
  • Tsutomu Matsumoto
  • Hideki Imai
چکیده

Let In = {0, 1}n, and Hn be the set of all functions from In to In. For f ∈ Hn, define the DES-like transformation associated with f by F2n,f (L, R) = (R ⊕ f(L), L), where L, R ∈ In. For f1, f2, . . . , fs ∈ Hn, define ψ(fs, . . . , f2, f1) = F2n,fs ◦ · · · ◦ F2n,f2 ◦ F2n,f1 . Our main result is that ψ(f, f j , f ) is not pseudorandom for any positive integers i, j, k, where f i denotes the i-fold composition of f . Thus, as immediate consequences, we have that (1) none of ψ(f, f, f), ψ(f, f, f) and ψ(f, f, f) are pseudorandom and, (2) Ohnishi’s constructions ψ(g, g, f) and ψ(g, f, f) are optimal. Generalizations of the main result are also considered.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Pseudorandomness of Elastic Block Ciphers

We investigate elastic block ciphers, a method for constructing variable length block ciphers, from a theoretical perspective. We view the underlying structure of an elastic block cipher as a network, which we refer to as an elastic network, and analyze the network in a manner similar to the analysis performed by Luby and Rackoff on Feistel networks. We prove that a three round elastic network ...

متن کامل

Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators

The standard approach for constructing a large-stretch pseudorandom generator given a one-way permutation or given a smaller-stretch pseudo-random generator involves repeatedly composing the given primitive with itself. In this paper, we consider whether this approach is necessary, that is, whether there are constructions that do not involve composition. More formally, we consider black-box con...

متن کامل

On the XOR of Multiple Random Permutations

A straightforward way of constructing an n-bit pseudorandom function is to XOR two or more pseudorandom permutations: p1 ⊕ . . .⊕pk. This XOR construction has gained broad attention over the last two decades. In this work, we revisit the security of this well-established construction. We consider the case where the underlying permutations are considered secret, as well as the case where these p...

متن کامل

On the Construction of Pseudo-Random Permutations: Luby-Racko Revisited

Luby and Racko [27] showed a method for constructing a pseudo-random permutation from a pseudo-random function. The method is based on composing four (or three for weakened security) so called Feistel permutations, each of which requires the evaluation of a pseudo-random function. We reduce somewhat the complexity of the construction and simplify its proof of security by showing that two Feiste...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1989