Security in O(2n) for the Xor of Two Random Permutations \\ - Proof with the standard H technique -
نویسنده
چکیده
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H technique” instead of the “Hσ technique”. It will be interesting to compare the two techniques, their similarities and the differences between the proofs and the results.
منابع مشابه
Security in O(2) for the Xor of Two Random Permutations – Proof with the standard H technique–
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H tec...
متن کاملA Proof of Security in O(2) for the Xor of Two Random Permutations – Proof with the “Hσ technique”–
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction. Since such construction has many applications in cryptography (see [2, 3, 4, 6] for example), this problem is interesting both from a theoretical and from a practical point of view. In [6], it was proved ...
متن کاملA Proof of Security in O(2n) for the Xor of Two Random Permutations
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction. Since such construction has many applications in cryptography (see [2, 3, 4, 6] for example), this problem is interesting both from a theoretical and from a practical point of view. In [6], it was proved ...
متن کاملA Proof of Security in O(2) for the Xor of Two Random Permutations
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. The aim of this paper is to get precise security results for this construction. Since such construction has many applications in cryptography (see [2–4, 6] for example), this problem is interesting both from a theoretical and from a practical point of view. In [6], it was proved that...
متن کاملThe Security of Many-Round Luby-Rackoff Pseudo-Random Permutations
Luby and Rackoff showed how to construct a (super-)pseudorandom permutation {0, 1}2n → {0, 1}2n from some number r of pseudorandom functions {0, 1}n → {0, 1}n. Their construction, motivated by DES, consists of a cascade of r Feistel permutations. A Feistel permutation 1for a pseudo-random function f is defined as (L, R) → (R, L ⊕ f(R)), where L and R are the left and right part of the input and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013