Constructing a Pseudo Random Function (PRF) from a pseudorandom permutation is a fundamental problem in cryptology. Such a construction, implemented by truncating the last m bits of permutations of (formula presented) was suggested by Hall et al. (1998). They conjectured that the distinguishing advantage of an adversary with q quesires, (formula presented), is small if (formula presented), established an upper bound on (formula presented) that confirms the conjecture for (formula presented), and also declared a general lower bound (formula presented). The conjecture was essentially confirmed by Bellare and Impagliazzo in 1999. Nevertheless, the problem of estimating (formula presented) remained open. Combining the trivial bound 1, the birthday bound, and a result by Stam (1978) leads to the following upper bound: (formula presented) This upper bound shows that the number of times that a truncated permutation can be used as a PRF can exceed the birthday bound by at least a factor of (formula presented). In this paper we show that this upper bound is tight for every (formula presented) and (formula presented). This, in turn, verifies that the converse to the conjecture of Hall et al. is also correct, i.e., that (formula presented) is negligible only for (formula presented).
|Title of host publication||Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings|
|Editors||Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung|
|Number of pages||10|
|State||Published - 2019|
|Event||3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019 - Beer Sheva, Israel|
Duration: 27 Jun 2019 → 28 Jun 2019
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Conference||3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019|
|Period||27/06/19 → 28/06/19|
Bibliographical noteFunding Information:
This research was partially supported by: The Israel Science Foundation (grant No. 1018/16); The BIU Center for Research in Applied Cryptography and Cyber Security, in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office; The Center for Cyber Law and Policy at the University of Haifa in conjunction with the Israel National Cyber Directorate in the Prime Minister’s Office.
© Springer Nature Switzerland AG 2019.
- Pseudo random functions
- Pseudo random permutations