Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family

  • Authors:
  • Scott R. Fluhrer

  • Affiliations:
  • -

  • Venue:
  • FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an attack on the SEAL Pseudorandom Function Family that is able to efficiently distinguish it from a truly random function with 243 bytes output. While this is not a practical attack on any use of SEAL, it does demonstrate that SEAL does not achieve its design goals.