Security amplification for the cascade of arbitrarily weak PRPs: tight bounds via the interactive hardcore lemma

  • Authors:
  • Stefano Tessaro

  • Affiliations:
  • Department of Computer Science and Engineering, University of California, San Diego, La Jolla, CA

  • Venue:
  • TCC'11 Proceedings of the 8th conference on Theory of cryptography
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We consider the task of amplifying the security of a weak pseudorandom permutation (PRP), called an ε-PRP, for which the computational distinguishing advantage is only guaranteed to be bounded by some (possibly non-negligible) quantity ε 1. We prove that the cascade (i.e., sequential composition) of m ε-PRPs (with independent keys) is an ((m - (m - 1)ε)εm + V)-PRP, where V is a negligible function. In the asymptotic setting, this implies security amplification for all ε 1-1/poly, and the result extends to two-sided PRPs, where the inverse of the given permutation is also queried. Furthermore, we show that this result is essentially tight. This settles a long-standing open problem due to Luby and Rackoff (STOC '86). Our approach relies on the first hardcore lemma for computational indistinguishability of interactive systems: Given two systems whose states do not depend on the interaction, and which no efficient adversary can distinguish with advantage better than ε, we show that there exist events on the choices of the respective states, occurring each with probability at least 1-ε, such that the two systems are computationally indistinguishable conditioned on these events.