How to stretch random functions: The security of protected counter sums

Authors
Citation
Dj. Bernstein, How to stretch random functions: The security of protected counter sums, J CRYPTOL, 12(3), 1999, pp. 185-192
Citations number
15
Categorie Soggetti
Computer Science & Engineering
Journal title
JOURNAL OF CRYPTOLOGY
ISSN journal
09332790 → ACNP
Volume
12
Issue
3
Year of publication
1999
Pages
185 - 192
Database
ISI
SICI code
0933-2790(199922)12:3<185:HTSRFT>2.0.ZU;2-5
Abstract
Let f be an unpredictable random function taking (b + c)-bit inputs to b-bi t outputs. This paper presents an unpredictable random function S' taking v ariable-length inputs to b-bit outputs. This construction has several advan tages over chaining, which was proven unpredictable by Bellare, Kilian, and Rogaway, and cascading, which was proven unpredictable by Bellare, Canetti , and Krawczyk. The highlight here is a very simple proof of security.