PSEUDO-RANDOM FUNCTIONS
1 / 65
PSEUDO-RANDOM FUNCTIONS 1 / 65 Recall We studied security of a - - PowerPoint PPT Presentation
PSEUDO-RANDOM FUNCTIONS 1 / 65 Recall We studied security of a block cipher against key recovery. But we saw that security against key recovery is not sufficient to ensure that natural usages of a block cipher are secure. We want to answer the
1 / 65
2 / 65
3 / 65
3 / 65
4 / 65
5 / 65
6 / 65
6 / 65
7 / 65
8 / 65
8 / 65
$
9 / 65
$
{0,1}l ⇒ d
10 / 65
$
{0,1}3 ⇒ true
11 / 65
$
{0,1}3 ⇒ true
11 / 65
$
{0,1}3 ⇒ true
12 / 65
$
{0,1}3 ⇒ true
12 / 65
$
{0,1}3 ⇒ true
13 / 65
$
{0,1}3 ⇒ true
13 / 65
14 / 65
15 / 65
16 / 65
$
$
17 / 65
$
18 / 65
$
$
F⇒1
Range(F)⇒1
F (A) = Pr
F⇒1
Range(F)⇒1
$
20 / 65
$
F⇒1
20 / 65
$
F⇒1
20 / 65
$
$
Range(F)⇒1
21 / 65
$
$
Range(F)⇒1
21 / 65
F (A)
1
F⇒1
2−128
Range(F)⇒1
22 / 65
F (A) = Pr
F⇒1
Range(F)⇒1
23 / 65
F (A) is “small” for ALL A that
F (A) ≤ 2−n
24 / 65
$
F (A) = Pr
F⇒1
Range(F)⇒1
25 / 65
$
F (A) = Pr
F⇒1
Range(F)⇒1
25 / 65
$
26 / 65
$
F⇒1
Range(F)⇒1
27 / 65
F (A)
1
F⇒1
2−128
Range(F)⇒1
28 / 65
$
F (A) = Pr
F⇒1
Range(F)⇒1
29 / 65
$
F (A) = Pr
F⇒1
Range(F)⇒1
29 / 65
30 / 65
$
31 / 65
$
F⇒1
31 / 65
$
F⇒1
31 / 65
$
$
32 / 65
$
$
F⇒1
32 / 65
$
$
F⇒1
32 / 65
$
$
F⇒1
32 / 65
F (A)
1
F⇒1
2−ℓ
Range(F)⇒1
33 / 65
34 / 65
34 / 65
34 / 65
35 / 65
$
36 / 65
$
2N
36 / 65
$
q−1
q−1
38 / 65
39 / 65
40 / 65
40 / 65
41 / 65
$
E (A) = Pr
E⇒1
{0,1}ℓ⇒1
42 / 65
43 / 65
44 / 65
$
E⇒1
45 / 65
$
E⇒1
45 / 65
$
{0,1}ℓ⇒1
46 / 65
E (A)
1
F⇒1
1−C(2ℓ,q)
Range(F)⇒1
E (A) ≈ 1 .
47 / 65
48 / 65
49 / 65
50 / 65
51 / 65
$
F (B)
F ⇒true
F (B) is “small” for all B of
52 / 65
53 / 65
53 / 65
. . . 9 > = > ; j − 1 1 . . . 9 > = > ; ℓ − j
54 / 65
F (B) = 1 .
55 / 65
$
56 / 65
57 / 65
F (B) ≤ Advprf F (A) + ·
F (A) is small
F (B) is small
58 / 65
F (B) ≤ Advprf F (A) + ·
F (B) is big
F (A) is big
59 / 65
60 / 65
F (B) ≤ Advprf F (A) + ⊡
61 / 65
F (B) ≤ Advprf F (A) + ⊡
$
62 / 65
$
F⇒1
F (B)
Range(F)⇒1
F (A) ≥ Advkr F (B) − 2−L
63 / 65
F (B) ≤ Advprf F (A) + 2−L
64 / 65
65 / 65