CONSTRUCTION OF PSEUDORANDOM PERMUTATIONS

Citation
Y. Ohnishi et A. Maruoka, CONSTRUCTION OF PSEUDORANDOM PERMUTATIONS, Systems and computers in Japan, 25(9), 1994, pp. 32-40
Citations number
7
Categorie Soggetti
Computer Science Hardware & Architecture","Computer Science Information Systems","Computer Science Theory & Methods
ISSN journal
08821666
Volume
25
Issue
9
Year of publication
1994
Pages
32 - 40
Database
ISI
SICI code
0882-1666(1994)25:9<32:COPP>2.0.ZU;2-0
Abstract
The permutation from {0, 1}2n to {0, 1}2n represented by S(f) in DES ( Data Encryption Standard) is used as the basic operation. Let f be a f unction from {0, 1}n to {0, 1}n and + denote bitwise exclusive or. The n S(f) is defined S(f)(L.R) = R.[L+f(R)] where L, R is-an-element-of { 0, 1}n. Moreover, let S(f2, f1, f0) denote the composition of S(f2), S (f1) and S(f0), and {S(f2, f1, f0)} denote a set of S(f2, f1, f0) obta ined when f0, f1 and f2 are chosen randomly from a set of pseudorandom functions. Luby et al. have shown that {S(f2, f1, f0)} is pseudorando m. This paper investigates the case in which there are two different p seudorandom functions and shows that while {S(f1, f1, f0)} and {S(f1, f0, f0)} are pseudorandom, {S(f0, f1, f0)} is not.