Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

How to construct pseudorandom permutations from pseudorandom functions

Published: 01 April 1988 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2024)Hierarchical Key Assignment Schemes with Key RotationProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657037(171-182)Online publication date: 24-Jun-2024
  • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
  • (2024)Ensuring End-to-End Security With Fine-Grained Access Control for Connected and Autonomous VehiclesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341729219(6962-6977)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Reviews

Pradip K. Srimani

The authors' main purpose in this paper is to propose an efficient strategy for the construction of a pseudorandom invertible permutation generator from a pseudorandom function generator. By combining this strategy with the previous result that a pseudorandom function generator can be built efficiently from a pseudorandom bit generator, the authors provide a ready method for the design of a block private key cryptosystem that is secure against chosen plaintext attack. Their correctness proofs and method of construction are elegant, and their presentation is excellent and fairly self-contained. Another important contribution of this paper is a more formal and mathematical description of the concepts of the well-known data encryption standard (DES) cryptographic methodology. The reader will need a reasonable amount of mathematical maturity, as well as a familiarity with complexity theory and combinatorics, to make complete sense of this paper. The authors provide precise and formal definitions for most of the terms and concepts in the area of cryptosystems security, and they largely succeed in giving a theoretical justification for the apparent security of the DES system. Anyone interested in the security of cryptosystems would benefit from reading this paper, even if she or he is not interested in the detailed mathematical proofs.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image SIAM Journal on Computing
SIAM Journal on Computing  Volume 17, Issue 2
Special issue on cryptography
April 1988
248 pages

Publisher

Society for Industrial and Applied Mathematics

United States

Publication History

Published: 01 April 1988

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Hierarchical Key Assignment Schemes with Key RotationProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657037(171-182)Online publication date: 24-Jun-2024
  • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
  • (2024)Ensuring End-to-End Security With Fine-Grained Access Control for Connected and Autonomous VehiclesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341729219(6962-6977)Online publication date: 1-Jan-2024
  • (2024)CCA security for contracting (quasi-)Feistel constructions with tight round complexityDesigns, Codes and Cryptography10.1007/s10623-024-01394-x92:8(2103-2129)Online publication date: 1-Aug-2024
  • (2024)On the sequential indifferentiability of the Lai–Massey constructionDesigns, Codes and Cryptography10.1007/s10623-024-01361-692:6(1637-1661)Online publication date: 1-Jun-2024
  • (2024)BBB security for 5-round even-Mansour-based key-alternating Feistel ciphersDesigns, Codes and Cryptography10.1007/s10623-023-01288-492:1(13-49)Online publication date: 1-Jan-2024
  • (2024)Indifferentiability of 3-Round Confusion-Diffusion NetworksSecurity and Cryptography for Networks10.1007/978-3-031-71073-5_7(140-161)Online publication date: 11-Sep-2024
  • (2024)Mystrium: Wide Block Encryption Efficient on Entry-Level ProcessorsSecurity and Cryptography for Networks10.1007/978-3-031-71073-5_4(71-96)Online publication date: 11-Sep-2024
  • (2024)Unbiasable Verifiable Random FunctionsAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58737-5_6(142-167)Online publication date: 26-May-2024
  • (2023)Adaptive data analysis in a balanced adversarial modelProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3667242(25748-25760)Online publication date: 10-Dec-2023
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media