On the construction of pseudorandom permutations: Luby-Rackoff revisited

被引:191
作者
Naor, M [1 ]
Reingold, O [1 ]
机构
[1] Weizmann Inst Sci, Dept Appl Math & Comp Sci, IL-76100 Rehovot, Israel
关键词
pseudorandomness; block ciphers; modes of operation;
D O I
10.1007/PL00003817
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Luby and Rackoff [26] showed a method for constructing a pseudorandom permutation from a pseudorandom function. The method is based on composing four (or three for weakened security) so-called Feistel permutations, each of which requires the evaluation of a pseudorandom function. We reduce somewhat the complexity of the construction and simplify its proof of security by showing that two Feistel permutations are sufficient together with initial and final pairwise independent permutations. The revised construction and proof provide a framework in which similar constructions may be brought up and their security can be easily proved. We demonstrate this by presenting some additional adjustments of the construction that achieve the following: Reduce the success probability of the adversary. Provide a construction of pseudorandom permutations with large input-length using pseudorandom functions with small input-length.
引用
收藏
页码:29 / 66
页数:38
相关论文
共 51 条
[1]  
Aiello W, 1996, LECT NOTES COMPUT SC, V1070, P307
[2]   STRONG UNIFORM TIMES AND FINITE RANDOM-WALKS [J].
ALDOUS, D ;
DIACONIS, P .
ADVANCES IN APPLIED MATHEMATICS, 1987, 8 (01) :69-97
[3]   SIMPLE CONSTRUCTIONS OF ALMOST K-WISE INDEPENDENT RANDOM-VARIABLES [J].
ALON, N ;
GOLDREICH, O ;
HASTAD, J ;
PERALTA, R .
RANDOM STRUCTURES & ALGORITHMS, 1992, 3 (03) :289-304
[4]   A FAST AND SIMPLE RANDOMIZED PARALLEL ALGORITHM FOR THE MAXIMAL INDEPENDENT SET PROBLEM [J].
ALON, N ;
BABAI, L ;
ITAI, A .
JOURNAL OF ALGORITHMS, 1986, 7 (04) :567-583
[5]  
Anderson R., 1996, LNCS, V1039, P113, DOI DOI 10.1007/3-540-60865-6
[6]  
[Anonymous], LNCS
[7]  
[Anonymous], 1982, 23 ANN S FDN COMPUTE, DOI DOI 10.1109/SFCS.1982.45
[8]  
[Anonymous], 1996, LNCS, DOI DOI 10.1007/3-540-68697-5
[9]  
[Anonymous], 1993, LECT NOTES COMPUTER
[10]   Pseudorandom functions revisited: The cascade construction and its concrete security [J].
Bellare, M ;
Canetti, R ;
Krawczyk, H .
37TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1996, :514-523