SciELO - Scientific Electronic Library Online

 
vol.12 issue3Construction of Rotation Symmetric Boolean Functions with optimal Algebraic ImmunityAlgebraic Immunity of Boolean Functions - Analysis and Construction author indexsubject indexsearch form
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • Have no similar articlesSimilars in SciELO

Share


Computación y Sistemas

Print version ISSN 1405-5546

Abstract

NANDI, Mridul. A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation. Comp. y Sist. [online]. 2009, vol.12, n.3, pp.285-296. ISSN 1405-5546.

Let E be a strong pseudorandom permutation (or SPRP) secure enciphering scheme (i.e., a length-preserving encryption scheme) which can only encrypt messages of size multiple of n, the block size of the underlying block cipher. There are several such constructions, e.g., CBC mode or cipher block chaining mode. In this paper we present how a secure enciphering scheme can be obtained which can encrypt any messages of size at least n based on E and some other cryptographic objects such as weak pseudorandom function (or WPRF) and a universal hash function. So can encrypt messages which might contain incomplete message blocks. Since an enciphering scheme is a length preserving encryption algorithm, one can not use a padding rule to handle the incomplete message block. In 2007, Ristenpart and Rogaway first proposed a secure method known as XLS (eXtension by Latin Squares). It needs two invocations of a block cipher e whose key is chosen independently of the key of E. The SPRP security of XLS is based on the SPRP security of the block cipher e. Our proposed enciphering scheme is SPRP and it needs only one invocation of a WPRF and two invocations of a universal hash function. Any SPRP construction, e.g., a secure block cipher, is a WPRF. Moreover, there are other several efficient constructions for universal hash functions and WPRF which are not SPRP. Thus, we are able to replace SPRP security by two weaker security notions to extend the domain of a secure enciphering scheme.

Keywords : strong pseudorandom permutation; weak pseudorandom function; universal hash function; modes of operations.

        · abstract in Spanish     · text in English     · English ( pdf )

 

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License