On the XOR of Multiple Random Permutations
نویسندگان
چکیده
A straightforward way of constructing an n-bit pseudorandom function is to XOR two or more pseudorandom permutations: p1 ⊕ . . .⊕pk. This XOR construction has gained broad attention over the last two decades. In this work, we revisit the security of this well-established construction. We consider the case where the underlying permutations are considered secret, as well as the case where these permutations are publicly available to the adversary. In the secret permutation setting, we present a simple reduction showing that the XOR construction achieves optimal 2 security for all k ≥ 2, therewith improving a recent result of Cogliati et al. (FSE 2014). Regarding the public permutation setting, Mandal et al. (INDOCRYPT 2010) proved 2 security for the case k = 2, but we point out the existence of a non-trivial flaw in the proof. We re-establish and generalize the claimed security bound for general k ≥ 2 using a different proof approach.
منابع مشابه
Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction when the two permutations on n bits f and g are public. We will first prove that f ⊕ g is indifferentiable from a random function on n bits when the attacker is limited with q queries, with q ≪ √ 2. This b...
متن کاملGeneric Attacks for the Xor of k Random Permutations
Xoring the output of k permutations, k ≥ 2 is a very simple way to construct pseudo-random functions (PRF) from pseudo-random permutations (PRP). Moreover such construction has many applications in cryptography (see [2, 3, 4, 5] for example). Therefore it is interesting both from a theoretical and from a practical point of view, to get precise security results for this construction. In this pap...
متن کاملTowards Understanding the Known-Key Security of Block Ciphers
Known-key distinguishers for block ciphers were proposed by Knudsen and Rijmen at ASIACRYPT 2007 and have been a major research topic in cryptanalysis since then. A formalization of known-key attacks in general is known to be difficult. In this paper, we tackle this problem for the case of block ciphers based on ideal components such as random permutations and random functions as well as propos...
متن کاملSecurity in O(2n) for the Xor of Two Random Permutations \\ - Proof with the standard H technique -
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H tec...
متن کاملSecurity in O(2) for the Xor of Two Random Permutations – Proof with the standard H technique–
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H tec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015