Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security
نویسندگان
چکیده
Pseudorandom function families are a powerful cryptographic primitive, yielding, in particular, simple solutions for the main problems in private key cryptography. Their existence based on general assumptions (namely, the existence of one-way functions) has been established. In this work we investigate new ways of designing pseudorandom function families. The goal is to find constructions that are both efficient and secure, and thus eventually to bring the benefits of pseudorandom functions to practice. The basic building blocks in our design are certain limited versions of pseudorandom function families, called finite-length input pseudorandom function families, for which very efficient realizations exist in practical cryptography. Thus rather than starting from one-way functions, we propose constructions of “full-fledged” pseudorandom function families from these limited ones. In particular we propose the cascade construction, and provide a concrete security analysis which relates the strength of the cascade to that of the underlying finite pseudorandom function family in a precise and quantitative way. Department of Computer Science & Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, La Jolla, CA 92093. Email: [email protected]. † IBM T.J. Watson Research Center, PO Box 704, Yorktown Heights, New York 10598. Email: canetti@ watson.ibm.com. Work done while author was at MIT. ‡ IBM T.J. Watson Research Center, PO Box 704, Yorktown Heights, New York 10598. Email: hugo@ watson.ibm.com.
منابع مشابه
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
We propose a new cryptographic construction called 3C, which works as a pseudorandom function (PRF), message authentication code (MAC) and cryptographic hash function. The 3Cconstruction is obtained by modifying the Merkle-Damg̊ard iterated construction used to construct iterated hash functions. We assume that the compression functions of Merkle-Damg̊ard iterated construction realize a family of ...
متن کاملOn the Construction of Pseudo-Random Permutations: Luby-Racko Revisited
Luby and Racko [27] showed a method for constructing a pseudo-random permutation from a pseudo-random function. The method is based on composing four (or three for weakened security) so called Feistel permutations, each of which requires the evaluation of a pseudo-random function. We reduce somewhat the complexity of the construction and simplify its proof of security by showing that two Feiste...
متن کاملFarfalle: parallel permutation-based cryptography
In this paper, we introduce Farfalle, a newmode for building a pseudorandom function (PRF) from a b-bit cryptographic permutation. The constructed PRF takes as input a b-bit key and a sequence of variable-length data strings, and it generates a variable-length output. It consists of a compression layer and an expansion layer, each of them involving the parallel application of the permutation. T...
متن کاملNew Design Criteria for Hash Functions and Block Ciphers
Cryptographic primitives, such as hash functions and block ciphers, are integral components in several practical cryptographic schemes. In order to prove security of these schemes, a variety of security assumptions are made on the underlying hash function or block cipher, such as collision-resistance, pseudorandomness etc. In fact, such assumptions are often made without much regard for the act...
متن کاملConcrete Security Characterizations of PRFs and PRPs: Reductions and Applications
We investigate several alternate characterizations of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) in a concrete security setting. By analyzing the concrete complexity of the reductions between the standard notions and the alternate ones, we show that the latter, while equivalent under polynomial-time reductions, are weaker in the concrete security sense. With these altern...
متن کامل