A Simple and Unified Method of Proving Unpredictability
نویسنده
چکیده
Recently Bernstein [4] has provided a simpler proof of unpredictability of CBC construction [3] which is giving insight of the construction. Unpredictability of any function intuitively means that the function behaves very closely to a uniform random function. In this paper we make a unifying and simple approach to prove unpredictability of many existing constructions. We first revisit Bernstein’s proof. Using this idea we can show a simpler proof of unpredictability of a class of DAG based construction [7], XCBC [5], TMAC [8], OMAC [9] and PMAC [6]. We also provide a simpler proof for stronger bound of CBC [1] and a simpler proof of security of on-line Hash-CBC [2]. We note that there is a flaw in the security proof of Hash-CBC in [2]. This paper will help to understand security analysis of unpredictability of many constructions in a simpler way.
منابع مشابه
Novel Unified Control Method of Induction and Permanent Magnet Synchronous Motors
Many control schemes have been proposed for induction motor and permanent magnet synchronous motor control, which are almost highly complex and non-linear. Also, a simple and efficient method for unified control of the electric moto are rarely investigated. In this paper, a novel control method based on rotor flux orientation is proposed. The novelties of proposed method are elimination of q-ax...
متن کاملTwo Interpretative Analyses of the Verses on Reasoning and Thinking in Proving Thinking-Orientedness of the Educational Model of the Holy Qur'an
In the scientific and cultural literature, the term "education" includes all the aspects and components of a process that provides the ground for the conscious and voluntary transformation of mankind. Based on the Islamic viewpoint, this concept includes all actions and measures, including correction, purification, teaching and admonition, which must be carefully and coherently organized in a s...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملUnequal group sizes in randomised trials: guarding against guessing.
We cringe at the pervasive notion that a randomised trial needs to yield equal sample sizes in the comparison groups. Unfortunately, that conceptual misunderstanding can lead to bias by investigators who force equality, especially if by non-scientific means. In simple, unrestricted, randomised trials (analogous to repeated coin-tossing), the sizes of groups should indicate random variation. In ...
متن کاملA Methodology for Unified Assessment of Physical and Geographical Dependencies of Wide Area Measurement Systems in Smart Grids
Wide Area Measurement Systems (WAMS) enable real time monitoring and control of smart grids by combining digital measurement devices, communication and control systems. As WAMS consist of various infrastructures, they imply complex dependencies among their underlying systems and components of different types, such as cyber, physical and geographical dependencies. Although several works exist in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2006 شماره
صفحات -
تاریخ انتشار 2006