Power of a public random permutation and its application to authenticated encryption

  • Authors:
  • Kaoru Kurosawa

  • Affiliations:
  • Department of Computer and Information Sciences, Ibaraki University, Hitachi, Ibaraki, Japan

  • Venue:
  • IEEE Transactions on Information Theory
  • Year:
  • 2010

Quantified Score

Hi-index 754.84

Visualization

Abstract

This paper shows that many independent pseudorandom permutations over {O, 1}n can be obtained from a single public random permutation and secret n bits. It is then proved that a slightly modified IAPM (an authenticated-encryption scheme) is secure even if the underlying block cipher F is publicly accessible (as a blackbox). A similar result is derived for DCB mode, too. The security proofs are based on our first result, and they are extremely simple. Finally, it is shown that our security bound is tight within a constant factor.