Security amplification for the cascade of arbitrarily weak PRPs: Tight bounds via the interactive hardcore lemma

21Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We consider the task of amplifying the security of a weak pseudorandom permutation (PRP), called an ε-PRP, for which the computational distinguishing advantage is only guaranteed to be bounded by some (possibly non-negligible) quantity ε<1. We prove that the cascade (i.e., sequential composition) of m ε-PRPs (with independent keys) is an ((m - (m - 1)ε)εm + ν)-PRP, where ν is a negligible function. In the asymptotic setting, this implies security amplification for all ε<1 - 1/poly, and the result extends to two-sided PRPs, where the inverse of the given permutation is also queried. Furthermore, we show that this result is essentially tight. This settles a long-standing open problem due to Luby and Rackoff (STOC '86). Our approach relies on the first hardcore lemma for computational indistinguishability of interactive systems: Given two systems whose states do not depend on the interaction, and which no efficient adversary can distinguish with advantage better than ε, we show that there exist events on the choices of the respective states, occurring each with probability at least 1-ε, such that the two systems are computationally indistinguishable conditioned on these events. © 2011 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Tessaro, S. (2011). Security amplification for the cascade of arbitrarily weak PRPs: Tight bounds via the interactive hardcore lemma. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6597 LNCS, pp. 37–54). Springer Verlag. https://doi.org/10.1007/978-3-642-19571-6_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free