Tweakable enciphering schemes using only the encryption function of a block cipher
Information Processing Letters
Hi-index | 0.00 |
It is known that a super-pseudorandom permutation can be constructed from a pseudorandom function f and two universal hash functions, h and h'. It is a four round Feistel permutation denoted by ψ(hk, f, f, h'k'). In this paper, we show how to re-use the secret key for f in this construction. Specifically, we show that (1) the same key can be used for both h and h', and (2) the key for h and h' can be derived from f. As a result, our construction requires only the key for f as a secret key, and it preserves computational efficiency and security. We show the full security proof of our construction. Also, we derive a similar result for a five round MISTY-type permutation.