Pseudorandom functions revisited: the cascade construction and its concrete security
- 23 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 02725428,p. 514-523
- https://doi.org/10.1109/sfcs.1996.548510
Abstract
Pseudorandom function families are a powerful cryptographic primitive, yielding, in particular simple solutions for the main problems in private key cryptography. Their existence based on general assumptions (namely the existence of one-way functions) has been established. The authors investigate new ways of designing pseudorandom function families. The goal is to find constructions that are both efficient and secure, and thus eventually to bring the benefits of pseudorandom functions to practice. The basic building blocks in the design are certain limited versions of pseudorandom function families, called finite length input pseudorandom function families, for which very efficient realizations exist impractical cryptography. Thus rather than starting from one-way functions, they propose constructions of "full-fledged" pseudorandom function families from these limited ones. In particular they propose the cascade construction, and provide a concrete security analysis which relates the strength of the cascade to that of the underlying finite pseudorandom function family in a precise and quantitative way.Keywords
This publication has 11 references indexed in Scilit:
- Synthesizers and their application to the parallel construction of pseudo-random functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The Security of Cipher Block ChainingPublished by Springer Nature ,2001
- Public Randomness in CryptographyPublished by Springer Nature ,2001
- XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom FunctionsPublished by Springer Nature ,1995
- MDx-MAC and Building Fast MACs from Hash FunctionsPublished by Springer Nature ,1995
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- One Way Hash Functions and DESPublished by Springer Nature ,1990
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979