Farasha: A Provable Permutation-Based Parallelizable PRF

被引:0
|
作者
Aaraj, Najwa [1 ]
Bellini, Emanuele [1 ]
Jejurikar, Ravindra [1 ]
Manzano, Marc [2 ,3 ]
Rohit, Raghvendra [1 ]
Salazar, Eugenio [1 ]
机构
[1] Technol Innovat Inst, Cryptog Res Ctr, Abu Dhabi, U Arab Emirates
[2] SandboxAQ, Palo Alto, CA USA
[3] Mondragon Unibertsitatea, Fac Engn, Elect & Comp Dept, Arrasate Mondragon, Spain
来源
SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022 | 2024年 / 13742卷
关键词
Pseudo random function; Farfalle; Almost xor universal function; AUTHENTICATED-ENCRYPTION; CIPHER; CONSTRUCTION; FAMILY; MODES;
D O I
10.1007/978-3-031-58411-4_20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The pseudorandom function Farfalle, proposed by Bertoni et al. at ToSC 2017, is a permutation based arbitrary length input and output PRF. At its core are the public permutations and feedback shift register based rolling functions. Being an elegant and parallelizable design, it is surprising that the security of Farfalle has been only investigated against generic cryptanalysis techniques such as differential/linear and algebraic attacks and nothing concrete about its provable security is known. To fill this gap, in this work, we propose Farasha, a new permutation-based parallelizable PRF with provable security. Farasha can be seen as a simple and provable Farfalle-like construction where the rolling functions in the compression and expansion phases of Farfalle are replaced by a uniform almost xor universal (AXU) and a simple counter, respectively. We then prove that in the random permutation model, the compression phase of Farasha can be shown to be an uniform AXU function and the expansion phase can be mapped to an Even-Mansour block cipher. Consequently, combining these two properties, we show that Farasha achieves a security of min{keysize, permutation size/2}. Finally, we provide concrete instantiations of Farasha with AXU functions providing different performance trade-offs. We believe our work will bring new insights in further understanding the provable security of Farfalle-like constructions.
引用
收藏
页码:437 / 458
页数:22
相关论文
共 50 条
  • [1] PAEQ: Parallelizable permutation-based authenticated encryption
    Biryukov, Alex (alex.biryukov@uni.lu), 1600, Springer Verlag (8783):
  • [2] Permutation-based distributed video coding
    Guo Lihua
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 85 - 89
  • [3] Quantized ranking for permutation-based indexing
    Mohamed, Hisham
    Marchand-Maillet, Stephane
    INFORMATION SYSTEMS, 2015, 52 : 163 - 175
  • [4] Boolean permutation-based key escrow
    Wu, Chuan-Kun
    Varadharajan, Vijay
    Computers and Electrical Engineering, 1999, 25 (04): : 291 - 304
  • [5] Boolean permutation-based key escrow
    Wu, CK
    Varadharajan, V
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 291 - 304
  • [6] Permutation-based tests of perfect ranking
    Zamanzade, Ehsan
    Arghami, Nasser Reza
    Vock, Michael
    STATISTICS & PROBABILITY LETTERS, 2012, 82 (12) : 2213 - 2220
  • [7] Permutation-based Sequential Pattern Hiding
    Gwadera, Robert
    Gkoulalas-Divanis, Aris
    Loukides, Grigorios
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2013, : 241 - 250
  • [8] Quantized Ranking for Permutation-Based Indexing
    Mohamed, Hisham
    Marchand-Maillet, Stephane
    SIMILARITY SEARCH AND APPLICATIONS (SISAP), 2013, 8199 : 103 - 114
  • [9] A PERMUTATION-BASED ALGORITHM FOR BLOCK CLUSTERING
    DUFFY, DE
    QUIROZ, AJ
    JOURNAL OF CLASSIFICATION, 1991, 8 (01) : 65 - 91
  • [10] A Permutation-based Code for the Wiretap Channel
    Kang, Wei
    Liu, Nan
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2306 - 2310