Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Pseudorandom permutation

From Wikipedia, the free encyclopedia
(Redirected fromUnpredictable permutation)
Class of functions in cryptography

Incryptography, apseudorandom permutation (PRP) is a function that cannot be distinguished from arandom permutation (that is, a permutation selected at random with uniform probability, from the family of all permutations on the function's domain) with practical effort.

Definition

[edit]

LetF be a mapping{0,1}n×{0,1}s{0,1}n{\displaystyle \left\{0,1\right\}^{n}\times \left\{0,1\right\}^{s}\rightarrow \left\{0,1\right\}^{n}}.F is a PRP if and only if

Apseudorandom permutation family is a collection of pseudorandom permutations, where a specific permutation may be chosen using a key.

The model of block ciphers

[edit]

The idealized abstraction of a (keyed)block cipher is a trulyrandom permutation on the mappings betweenplaintext andciphertext. If a distinguishing algorithm exists that achieves significantadvantage with less effort than specified by the block cipher'ssecurity parameter (this usually means the effort required should be about the same as a brute force search through the cipher's key space), then the cipher is considered broken at least in a certificational sense, even if such a break doesn't immediately lead to a practicalsecurity failure.[2]

Modern ciphers are expected to have super pseudorandomness.That is, the cipher should beindistinguishable from a randomly chosen permutation on the same message space, even if the adversary has black-box access to the forward and inverse directions of the cipher.[3]

Connections with pseudorandom function

[edit]

Michael Luby and Charles Rackoff[4] showed that a "strong" pseudorandom permutation can be built from apseudorandom function using aLuby–Rackoff construction which is built using aFeistel cipher.

Related concepts

[edit]

Unpredictable permutation

[edit]

Anunpredictable permutation (UP)Fk is apermutation whose values cannot be predicted by a fastrandomized algorithm. Unpredictable permutations may be used as acryptographic primitive, a building block for cryptographic systems with more complex properties.

Anadversary for an unpredictable permutation is defined to be an algorithm that is given access to an oracle for both forward and inverse permutation operations. The adversary is given a challenge inputk and is asked to predict the value ofFk. It is allowed to make a series of queries to the oracle to help it make this prediction, but is not allowed to query the value ofk itself.[5]

A randomized algorithm for generating permutations generates anunpredictable permutation if its outputs are permutations on a set of items (described by length-n binary strings) that cannot be predicted with accuracy significantly better than random by an adversary that makes a polynomial (inn) number of queries to the oracle prior to the challenge round, whose running time ispolynomial inn, and whose error probability is less than 1/2 for all instances. That is, it cannot be predicted in thecomplexity classPP,relativized by the oracle for the permutation.[5]

Properties of unpredictable permutations

[edit]

It can be shown that a functionFk is not a securemessage authentication code (MAC) if it satisfies only the unpredictability requirement. It can also be shown that one cannot build an efficient variable input length MAC from a block cipher which is modelled as a UP ofn bits. It has been shown that the output of ak = n/ω(log λ) round Feistel construction with unpredictable round functions may leak all the intermediate round values.[5] Even for realistic Unpredictable Functions (UF), some partial information about the intermediate round values may be leaked through the output. It was later shown that if a super-logarithmic number of rounds in the Feistel construction is used, then the resulting UP construction is secure even if the adversary gets all the intermediate round values along with the permutation output.[6]

There is also a theorem that has been proven in this regard which states that if there exists an efficient UP adversaryAπ that has non-negligible advantageεπ in the unpredictability game against UP construction ψU,k and which makes a polynomial number of queries to the challenger, then there also exists a UF adversaryAf that has non-negligible advantage in the unpredictability game against a UF sampled from the UF family F . From this, it can be shown that the maximum advantage of the UP adversaryAπ isεπ = O (εf. (qk)6). Hereεf denotes the maximum advantage of a UF adversary running in time O(t + (qk)5) against a UF sampled fromF, wheret is the running time of the PRP adversaryAψ andq is the number of queries made by it.[6][7]

In addition, a signature scheme that satisfies the property of unpredictability and not necessarily pseudo-randomness is essentially a Verifiable Unpredictable Function (VUF). A verifiable unpredictable function is defined analogously to a Verifiable Pseudorandom Function (VRF) but for pseudo-randomness being substituted with weaker unpredictability. Verifiable unpredictable permutations are the permutation analogs of VUFs or unpredictable analogs of VRPs. A VRP is also a VUP and a VUP can actually be built by building a VRP via the Feistel construction applied to a VRF. But this is not viewed useful since VUFs appear to be much easier to construct than VRFs.[8]

Applications

[edit]
K x X → X ∀ X={0,1}64, K={0,1}56
K x X → X ∀ k=X={0,1}128

See also

[edit]

References

[edit]
  1. ^Katz, Jonathan; Lindell, Yehuda (2007).Introduction to Modern Cryptography: Principles and Protocols. Chapman and Hall/CRC.ISBN 978-1584885511.
  2. ^Mihir Bellare,Phillip Rogaway (2005-05-11)."Chapter 4: Pseudorandom functions"(PDF).Introduction to Modern Cryptography. Retrieved2020-05-18.
  3. ^Craig Gentry and Zulfikar Ramzan."Eliminating Random Permutation Oracles in the Even-Mansour Cipher".
  4. ^Luby, Michael; Rackoff, Charles (1988)."How to Construct Pseudorandom Permutations from Pseudorandom Functions".SIAM J. Comput.17 (2):373–386.doi:10.1137/0217022.
  5. ^abcPuniya, Prashant (2007),New Design Criteria for Hash Functions and Block Ciphers(PDF), Ph.D. thesis, Department of Computer Science, New York University.
  6. ^abAdvances in Cryptology – EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques – by Moni Naor, International Association for Cryptologic Research
  7. ^Steinberger, John P. (2007)."The Collision Intractability of MDC-2 in the Ideal-Cipher Model"(PDF).Advances in Cryptology - EUROCRYPT 2007. Lecture Notes in Computer Science. Vol. 4515. pp. 34–51.Bibcode:2007LNCS.4515...34S.doi:10.1007/978-3-540-72540-4_3.ISBN 978-3-540-72539-8.S2CID 33464561. Archived fromthe original(PDF) on 25 March 2007. Retrieved27 February 2023.
  8. ^Micali, Silvio;Rabin, Michael; Vadhan, Salil (1999), "Verifiable random functions",40th Annual Symposium on Foundations of Computer Science (New York, 1999), IEEE Computer Soc., Los Alamitos, CA, pp. 120–130,CiteSeerX 10.1.1.207.6638,doi:10.1109/SFFCS.1999.814584,ISBN 978-0-7695-0409-4,MR 1917552,S2CID 221565852.
General
Mathematics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Pseudorandom_permutation&oldid=1292341735"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp