How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function?

Shoni Gilboa, Shay Gueron, Ben Morris

Research output: Contribution to journalArticlepeer-review

Abstract

An oracle chooses a function f from the set of n bits strings to itself, which is either a randomly chosen permutation or a randomly chosen function. When queried by an n-bit string w, the oracle computes f(w), truncates the m last bits, and returns only the first n- m bits of f(w). How many queries does a querying adversary need to submit in order to distinguish the truncated permutation from the (truncated) function? In Hall et al. (Building PRFs from PRPs, Springer, Berlin, 1998) showed an algorithm for determining (with high probability) whether or not f is a permutation, using O(2m+n2) queries. They also showed that if m< n/ 7 , a smaller number of queries will not suffice. For m> n/ 7 , their method gives a weaker bound. In this note, we first show how a modification of the approximation method used by Hall et al. can solve the problem completely. It extends the result to practically any m, showing that Ω(2m+n2) queries are needed to get a non-negligible distinguishing advantage. However, more surprisingly, a better bound for the distinguishing advantage, which we can write, in a simplified form, as O(min{q22n,q2n+m2,1}), can be obtained from a result of Stam published, in a different context, already in 1978. We also show that, at least in some cases, this bound is tight.

Original languageEnglish
Pages (from-to)162-171
Number of pages10
JournalJournal of Cryptology
Volume31
Issue number1
DOIs
StatePublished - 1 Jan 2018

Bibliographical note

Publisher Copyright:
© 2017, International Association for Cryptologic Research.

Keywords

  • Advantage
  • Pseudo-random functions
  • Pseudo-random permutations

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function?'. Together they form a unique fingerprint.

Cite this