Distinguishing a truncated random permutation from a random function

نویسندگان

  • Shoni Gilboa
  • Shay Gueron
چکیده

An oracle chooses a function f from the set of n bits strings to itself, which is either a randomly chosen permutation or a randomly chosen function. When queried by an n-bit string w, the oracle computes f(w), truncates the m last bits, and returns only the first n −m bits of f(w). How many queries does a querying adversary need to submit in order to distinguish the truncated permutation from a random function? In 1998, Hall et al. [2] showed an algorithm for determining (with high probability) whether or not f is a permutation, using O(2 m+n 2 ) queries. They also showed that if m < n/7, a smaller number of queries will not suffice. For m > n/7, their method gives a weaker bound. In this manuscript, we show how a modification of the method used by Hall et al. can solve the porblem completely. It extends the result to essentially every m, showing that Ω(2 m+n 2 ) queries are needed to get a non-negligible distinguishing advantage. We recently became aware that a better bound for the distinguishing advantage, for every m < n, follows from a result of Stam [3] published, in a different context, already in 1978.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Known and Chosen Key Differential Distinguishers for Block Ciphers

In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks for various hash function constructions based on block ciphers. Further, we prove the lower bound for finding a pair that follows some truncated differential in case of a random permutation. Then we ...

متن کامل

A quantum lower bound for distinguishing random functions from random permutations

The problem of distinguishing between a random function and a random permutation on a domain of size N is important in theoretical cryptography, where the security of many primitives depend on the problem’s hardness. We study the quantum query complexity of this problem, and show that any quantum algorithm that solves this problem with bounded error must make Ω(N1/5/polylogN) queries to the inp...

متن کامل

Hypothesis Testing and Advanced Distinguishers in Differential Cryptanalysis of Block Ciphers

Distinguishing distributions is a major part during cryptanalysis of symmetric block ciphers. The goal of the cryptanalyst is to distinguish two distributions; one that characterizes the number of certain events which occur totally at random and another one that characterizes same type of events but due to propagation inside the cipher. This can be realized as a hypothesis testing problem, wher...

متن کامل

The Advantage of Truncated Permutations

Let m < n be non-negative integers. An oracle chooses a permutation π of {0, 1}n uniformly at random. When queried with an n-bit string w, it truncates the lastm bits of π(w), and returns the remaining first n−m bits. Such truncated random permutations were suggested by Hall et al., in 1998, as a construction of a Pseudo Random Function. They conjectured that the distinguishing advantage of thi...

متن کامل

Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST

In this paper, we present a related key truncated differential attack on 27 rounds of XTEA which is the best known attack so far. With an expected success rate of 96.9%, we can attack 27 rounds of XTEA using 2 chosen plaintexts and with a complexity of 2 27round XTEA encryptions. We also propose several attacks on GOST. First, we present a distinguishing attack on full-round GOST, which can dis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015