Abstract
Pseudorandom functions are traditionally built upon block ciphers, but with the trend of permutation based cryptography, it is a natural question to investigate the design of pseudorandom functions from random permutations. We present a generic study of how to build beyond birthday bound secure pseudorandom functions from public random permutations. We first show that a pseudorandom function based on a single permutation call cannot be secure beyond the$$2^{n/2}$$ birthday bound, where n is the state size of the function. We next consider the Sum of Even-Mansour (SoEM) construction, that instantiates the sum of permutations with the Even-Mansour construction. We prove that SoEM achieves tight$$2n{/}3$$ -bit security if it is constructed from two independent permutations and two randomly drawn keys. We also demonstrate a birthday bound attack if either the permutations or the keys are identical. Finally, we present the Sum of Key Alternating Ciphers (SoKAC) construction, a translation of Encrypted Davies-Meyer Dual to a public permutation based setting, and show that SoKAC achieves tight$$2n{/}3$$ -bit security even when a single key is used.
| Original language | English |
|---|---|
| Title of host publication | Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings |
| Editors | Daniele Micciancio, Alexandra Boldyreva |
| Publisher | Springer Verlag |
| Pages | 266-293 |
| Number of pages | 28 |
| ISBN (Print) | 9783030269470 |
| DOIs | |
| State | Published - 2019 |
| Event | 39th Annual International Cryptology Conference, CRYPTO 2019 - Santa Barbara, United States Duration: 18 Aug 2019 → 22 Aug 2019 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 11692 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 39th Annual International Cryptology Conference, CRYPTO 2019 |
|---|---|
| Country/Territory | United States |
| City | Santa Barbara |
| Period | 18/08/19 → 22/08/19 |
Bibliographical note
Publisher Copyright:© 2019, International Association for Cryptologic Research.
Keywords
- Beyond the birthday bound
- RP-to-PRF
- SoEM
- SoKAC
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fingerprint
Dive into the research topics of 'How to Build Pseudorandom Functions from Public Random Permutations'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver