Introduction XORP and XORP [ k ] PRF-Security: Indistinguishability PRF-Security: Indistinguishability $ XORP A XORP ( A ) ∶ = ∣ Pr [A XORP → 1 ] − Pr [A $ → 1 ]∣ Adv prf Focus on information theoretic security of XORP . A comutationally unbounded. A deterministic. Restrict A to q queries. 1 = ( X 1 , 1 ,...,X 1 ,q ) , XORP and $ returns X q 2 = ( X 2 , 1 ,...,X 2 ,q ) ∈ Ω q X q Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction XORP and XORP [ k ] PRF-Security: Indistinguishability PRF-Security: Indistinguishability $ XORP A XORP ( A ) ∶ = ∣ Pr [A XORP → 1 ] − Pr [A $ → 1 ]∣ Adv prf Focus on information theoretic security of XORP . A comutationally unbounded. A deterministic. Restrict A to q queries. 1 = ( X 1 , 1 ,...,X 1 ,q ) , XORP and $ returns X q 2 = ( X 2 , 1 ,...,X 2 ,q ) ∈ Ω q X q Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction XORP and XORP [ k ] PRF-Security: Indistinguishability PRF-Security: Indistinguishability $ XORP A XORP ( A ) ∶ = ∣ Pr [A XORP → 1 ] − Pr [A $ → 1 ]∣ Adv prf Focus on information theoretic security of XORP . A comutationally unbounded. A deterministic. Restrict A to q queries. 1 = ( X 1 , 1 ,...,X 1 ,q ) , XORP and $ returns X q 2 = ( X 2 , 1 ,...,X 2 ,q ) ∈ Ω q X q XORP [ k ] (A) ≤ max E⊆ Ω q ∑ x q ∈E ( Pr [ X q 1 = x q ] − Pr [ X q 2 = x q ]) . Adv prf Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction XORP and XORP [ k ] PRF-Security Results Upper Bounds on Adv prf XORP (A) and Adv prf XORP [ k ] (A) 3 Bellare and Impagliazzo, 1999: O ( nq 2 ) for XORP 2 3 N Lucks, 2000: O ( q k + 1 N k ) for XORP [ k ] ,k ≥ 2 . Patarin, 2008, Patarin, 2013: O ( q N ) Cogliati et al., 2014: O ( q k + 2 N k + 1 ) , O (( kq 2 k + 2 N 2 k + 1 ) 3 ) for XORP [ k ] Dai et al., 2017: O ( q N ) for XORP . XORP [ k ] ( A ) = Adv prf XORP ( A ) Mennink and Preneel, 2015: Adv prf Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Moving from Secret to Public Permutation Moving from Secret to Public Permutation In PRF-security (indistinguishability) setting permuatations remain secret. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Moving from Secret to Public Permutation Moving from Secret to Public Permutation In PRF-security (indistinguishability) setting permuatations remain secret. Motivation behind making the permutations public Sometimes block ciphers are instantiated with fixed keys. Many unkeyed permutations are designed as an underlying primitive of encryption Bertoni et al., 2011a, MAC Bertoni et al., 2011b, hash functions Bertoni et al., 2013, Rivest et al., 2008, Wu, 2011, Gauravaram et al., 2009 CAESAR candidates have been analyzed in the public permutation model. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiable-Security Notion Indifferentiable-Security Notion Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiable-Security Notion Indifferentiable-Security Notion Real World Ideal World F T S G A Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiable-Security Notion Indifferentiable-Security Notion Real World Ideal World F T S G A T F , G S ( A ) = ∣ Pr [A T , F → 1 ] − Pr [A G , S → 1 ]∣ . Adv diff Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiable-Security Notion Indifferentiable-Security Notion Real World Ideal World F T S G A T F , G S ( A ) = ∣ Pr [A T , F → 1 ] − Pr [A G , S → 1 ]∣ . Adv diff Maurer et al., 2004 ∃ S s.t. Adv diff T F , G S (A) ⇒ T is indifferentiable is negligible ∀ adversary A . from G . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiability of XORP Indifferentiability of XORP Π = ( Π 0 , Π 1 , Π − 1 0 , Π − 1 1 ) $ XORP S A Purpose of S is to simulate Π such that ( XORP , Π ) is indistinguishable from ( $ , S ) . S has oracle access to $. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiability of XORP Real World and Ideal World Real World: Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiability of XORP Real World and Ideal World Real World: Construction Query: A queries with x . XORP returns Π 0 ( x ) ⊕ Π 1 ( x ) to A . Primitive Query: Forward Query: A queries Π 0 or Π 1 with x and gets Π 0 ( x ) or Π 1 ( x ) . Backward Query: A queries Π 0 or Π 1 with y 0 ( y ) or and obtains Π − 1 1 ( y ) . Π − 1 Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiability of XORP Real World and Ideal World Real World: Ideal World: Construction Query: A queries with x . XORP returns Π 0 ( x ) ⊕ Π 1 ( x ) to A . Primitive Query: Forward Query: A queries Π 0 or Π 1 with x and gets Π 0 ( x ) or Π 1 ( x ) . Backward Query: A queries Π 0 or Π 1 with y 0 ( y ) or and obtains Π − 1 1 ( y ) . Π − 1 Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiability of XORP Real World and Ideal World Real World: Ideal World: Random Function Query: $ returns $ ( x ) . Construction Query: A queries with x . XORP Simulator Query: returns Π 0 ( x ) ⊕ Π 1 ( x ) to Forward Query: A A . queries S with ( x,b ) . S returns V b ∈ { 0 , 1 } n . Primitive Query: Backward Query: A Forward Query: A queries S with ( y,b ) . S queries Π 0 or Π 1 with x and gets Π 0 ( x ) or Π 1 ( x ) . returns V b ∈ { 0 , 1 } n ∪ {�} . Backward Query: A � indicates that S queries Π 0 or Π 1 with y aborted after certain 0 ( y ) or and obtains Π − 1 number of iterations. 1 ( y ) . Π − 1 Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Indifferentiability of XORP Goal Purpose of S is to simulate Π such that ( XORP , Π ) is indistinguishable from ( $ , S ) . V b should be close to Π b (or Π − 1 b in case of backward query). Construct S such that XORP , $ ( A ) = ∣ Pr [ A XORP , Π → 1 ] − Pr [ A $ , S → 1 ]∣ Adv diff should be negligible. Restrict A to q queries and obtain a concrete upper bound on XORP , $ ( A ) (in terms of parameters q and n ) Adv diff Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Indifferentiability Results Results Construction Best known bound Our bound √ q 3 / 2 2 n Mennink and Preneel, 2015 q / 2 n XORP √ XORP [ k ] 2 nk ( k ≥ 4 even) Lee, 2017 q / 2 n q k + 1 Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Introduction Techniques Mirror Theory Mirror Theory and It’s Limitations Introduced in Patarin, 2010; motivated from the PRF-security of XORP [ k ] type constructions. Lower bound on the number of solutions satisfying a system of linear equations involving exactly two variables. ✓ Together with the × Complex: some stpes are not H-coefficient technique clear. × Limitation in indifferentiability provides a bound on the setting: PRF-security of XORP . × No equation in single variable ✓ Powerful: Optimal security × Adversary can make public of EDM, EWCDM, permutation calls. Need to etc. Mennink and Neves, 2017a, consider single variable Mennink and Neves, 2017b equations. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method X q ∶= ( X 1 ,...,X q ) and Z q ∶= ( Z 1 ,...,Z q ) distributed over Ω q = Ω × ⋯ × Ω according to P 0 and P 1 respectively. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method X q ∶= ( X 1 ,...,X q ) and Z q ∶= ( Z 1 ,...,Z q ) distributed over Ω q = Ω × ⋯ × Ω according to P 0 and P 1 respectively. P 0 ∣ x i − 1 ( x i ) = Pr [ X i = x i ∣ X 1 = x 1 ,...,X i − 1 = x i − 1 ] , P 1 ∣ x i − 1 ( x i ) = Pr [ Z i = x i ∣ Z 1 = x 1 ,...,Z i − 1 = x i − 1 ] . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method X q ∶= ( X 1 ,...,X q ) and Z q ∶= ( Z 1 ,...,Z q ) distributed over Ω q = Ω × ⋯ × Ω according to P 0 and P 1 respectively. P 0 ∣ x i − 1 ( x i ) = Pr [ X i = x i ∣ X 1 = x 1 ,...,X i − 1 = x i − 1 ] , P 1 ∣ x i − 1 ( x i ) = Pr [ Z i = x i ∣ Z 1 = x 1 ,...,Z i − 1 = x i − 1 ] . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method X q ∶= ( X 1 ,...,X q ) and Z q ∶= ( Z 1 ,...,Z q ) distributed over Ω q = Ω × ⋯ × Ω according to P 0 and P 1 respectively. P 0 ∣ x i − 1 ( x i ) = Pr [ X i = x i ∣ X 1 = x 1 ,...,X i − 1 = x i − 1 ] , P 1 ∣ x i − 1 ( x i ) = Pr [ Z i = x i ∣ Z 1 = x 1 ,...,Z i − 1 = x i − 1 ] . Definition Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method X q ∶= ( X 1 ,...,X q ) and Z q ∶= ( Z 1 ,...,Z q ) distributed over Ω q = Ω × ⋯ × Ω according to P 0 and P 1 respectively. P 0 ∣ x i − 1 ( x i ) = Pr [ X i = x i ∣ X 1 = x 1 ,...,X i − 1 = x i − 1 ] , P 1 ∣ x i − 1 ( x i ) = Pr [ Z i = x i ∣ Z 1 = x 1 ,...,Z i − 1 = x i − 1 ] . Definition ∥ P 0 − P 1 ∥ ∶= 1 2 ∑ x q ∈ Ω q ∣ P 0 ( x q ) − P 1 ( x q )∣ . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method X q ∶= ( X 1 ,...,X q ) and Z q ∶= ( Z 1 ,...,Z q ) distributed over Ω q = Ω × ⋯ × Ω according to P 0 and P 1 respectively. P 0 ∣ x i − 1 ( x i ) = Pr [ X i = x i ∣ X 1 = x 1 ,...,X i − 1 = x i − 1 ] , P 1 ∣ x i − 1 ( x i ) = Pr [ Z i = x i ∣ Z 1 = x 1 ,...,Z i − 1 = x i − 1 ] . Definition ∥ P 0 − P 1 ∥ ∶= 1 2 ∑ x q ∈ Ω q ∣ P 0 ( x q ) − P 1 ( x q )∣ . ( P 0 ∣ xi − 1 ( x i )− P 1 ∣ xi − 1 ( x i )) 2 χ 2 ( x i − 1 ) = χ 2 ( P 0 ∣ x i − 1 , P 1 ∣ x i − 1 ) ∶= ∑ x i ∈ Ω . P 1 ∣ xi − 1 ( x i ) Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method X q ∶= ( X 1 ,...,X q ) and Z q ∶= ( Z 1 ,...,Z q ) distributed over Ω q = Ω × ⋯ × Ω according to P 0 and P 1 respectively. P 0 ∣ x i − 1 ( x i ) = Pr [ X i = x i ∣ X 1 = x 1 ,...,X i − 1 = x i − 1 ] , P 1 ∣ x i − 1 ( x i ) = Pr [ Z i = x i ∣ Z 1 = x 1 ,...,Z i − 1 = x i − 1 ] . Definition ∥ P 0 − P 1 ∥ ∶= 1 2 ∑ x q ∈ Ω q ∣ P 0 ( x q ) − P 1 ( x q )∣ . ( P 0 ∣ xi − 1 ( x i )− P 1 ∣ xi − 1 ( x i )) 2 χ 2 ( x i − 1 ) = χ 2 ( P 0 ∣ x i − 1 , P 1 ∣ x i − 1 ) ∶= ∑ x i ∈ Ω . P 1 ∣ xi − 1 ( x i ) Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method X q ∶= ( X 1 ,...,X q ) and Z q ∶= ( Z 1 ,...,Z q ) distributed over Ω q = Ω × ⋯ × Ω according to P 0 and P 1 respectively. P 0 ∣ x i − 1 ( x i ) = Pr [ X i = x i ∣ X 1 = x 1 ,...,X i − 1 = x i − 1 ] , P 1 ∣ x i − 1 ( x i ) = Pr [ Z i = x i ∣ Z 1 = x 1 ,...,Z i − 1 = x i − 1 ] . Definition ∥ P 0 − P 1 ∥ ∶= 1 2 ∑ x q ∈ Ω q ∣ P 0 ( x q ) − P 1 ( x q )∣ . ( P 0 ∣ xi − 1 ( x i )− P 1 ∣ xi − 1 ( x i )) 2 χ 2 ( x i − 1 ) = χ 2 ( P 0 ∣ x i − 1 , P 1 ∣ x i − 1 ) ∶= ∑ x i ∈ Ω . P 1 ∣ xi − 1 ( x i ) Theorem (Dai et al., 2017) ∥ P 0 − P 1 ∥ ≤ ( 1 i = 1 Ex [ χ 2 ( X i − 1 )]) 1 2 ∑ q 2 Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method(contd..) Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method(contd..) Ingredients Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method(contd..) Ingredients 1 Pinsker’s inequality, 2 chain rule of Kullback-Leibler divergence (KL divergence), and 3 Jensen’s inequality. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method(contd..) Ingredients 1 Pinsker’s inequality, 2 chain rule of Kullback-Leibler divergence (KL divergence), and 3 Jensen’s inequality. Applications Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
χ 2 Method Introduction Techniques χ 2 Method(contd..) Ingredients 1 Pinsker’s inequality, 2 chain rule of Kullback-Leibler divergence (KL divergence), and 3 Jensen’s inequality. Applications 1 PRF-security of the truncated random permutation in Stam, 1978. 2 Full PRF-security of XORP and improved PRF-security of EDM in Dai et al., 2017. 3 Full PRF-security of the variable output length XOR pseudorandom functions in Bhattacharya and Nandi, 2018. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview SIM FWD and SIM BCK S consists of a pair of stateful randomized algorithms Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview SIM FWD and SIM BCK S consists of a pair of stateful randomized algorithms SIM FWD - algorithm for forward queries Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview SIM FWD and SIM BCK S consists of a pair of stateful randomized algorithms SIM FWD - algorithm for forward queries SIM BCK - algorithm for backward queries Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview SIM FWD and SIM BCK S consists of a pair of stateful randomized algorithms SIM FWD - algorithm for forward queries SIM BCK - algorithm for backward queries S tries to be consistent with the XORP by ‘consulting’ with $. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview SIM FWD and SIM BCK S consists of a pair of stateful randomized algorithms SIM FWD - algorithm for forward queries SIM BCK - algorithm for backward queries S tries to be consistent with the XORP by ‘consulting’ with $. Tries to maintain $ ( x ) = SIM FWD ( x, 0 ) ⊕ SIM FWD ( x, 1 ) for x ∈ { 0 , 1 } n . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview SIM FWD and SIM BCK S consists of a pair of stateful randomized algorithms SIM FWD - algorithm for forward queries SIM BCK - algorithm for backward queries S tries to be consistent with the XORP by ‘consulting’ with $. Tries to maintain $ ( x ) = SIM FWD ( x, 0 ) ⊕ SIM FWD ( x, 1 ) for x ∈ { 0 , 1 } n . If it fails (during backward queries only) after n attempts SIM BCK returns � . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview Internal State Sets D , R 0 , and R 1 simulate the domain of Π 0 and Π 1 and their ranges respectively. Lists (indexed by elements of D ) L 0 , L 1 - simulate the input-output mappings of Π 0 and Π 1 respectively. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview Internal State Sets D , R 0 , and R 1 simulate the domain of Π 0 and Π 1 and their ranges respectively. Lists (indexed by elements of D ) L 0 , L 1 - simulate the input-output mappings of Π 0 and Π 1 respectively. For b ∈ { 0 , 1 } ,x ∈ D ,y ∈ R b , L b ( x ) = y implies Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview Internal State Sets D , R 0 , and R 1 simulate the domain of Π 0 and Π 1 and their ranges respectively. Lists (indexed by elements of D ) L 0 , L 1 - simulate the input-output mappings of Π 0 and Π 1 respectively. For b ∈ { 0 , 1 } ,x ∈ D ,y ∈ R b , L b ( x ) = y implies V b = y was output on a forward query ( x,b ) , or Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview Internal State Sets D , R 0 , and R 1 simulate the domain of Π 0 and Π 1 and their ranges respectively. Lists (indexed by elements of D ) L 0 , L 1 - simulate the input-output mappings of Π 0 and Π 1 respectively. For b ∈ { 0 , 1 } ,x ∈ D ,y ∈ R b , L b ( x ) = y implies V b = y was output on a forward query ( x,b ) , or V b = x was output on a backward query ( y,b ) Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Overview Internal State Sets D , R 0 , and R 1 simulate the domain of Π 0 and Π 1 and their ranges respectively. Lists (indexed by elements of D ) L 0 , L 1 - simulate the input-output mappings of Π 0 and Π 1 respectively. For b ∈ { 0 , 1 } ,x ∈ D ,y ∈ R b , L b ( x ) = y implies V b = y was output on a forward query ( x,b ) , or V b = x was output on a backward query ( y,b ) For all x ∈ D , the relationship L 0 ( x ) ⊕ L 1 ( x ) = $ ( x ) is always satisfied. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM FWD Data : x ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n if x ∈ D then return L b ( x ) end Z ← $ ( x ) V b ← $ { 0 , 1 } n ∖ {R b ∪ { Z ⊕ R 1 − b }} R b ← R b ∪ { V b } , R 1 − b ← R 1 − b ∪ { Z ⊕ V b } D ← D ∪ { x } L b ( x ) ← V b , L 1 − b ( x ) ← Z ⊕ V b return V b Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM FWD Data : x ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n if x ∈ D then return L b ( x ) end Z ← $ ( x ) V b ← $ { 0 , 1 } n ∖ {R b ∪ { Z ⊕ R 1 − b }} R b ← R b ∪ { V b } , R 1 − b ← R 1 − b ∪ { Z ⊕ V b } D ← D ∪ { x } L b ( x ) ← V b , L 1 − b ( x ) ← Z ⊕ V b return V b Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM FWD Data : x ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n if x ∈ D then return L b ( x ) end Z ← $ ( x ) V b ← $ { 0 , 1 } n ∖ {R b ∪ { Z ⊕ R 1 − b }} R b ← R b ∪ { V b } , R 1 − b ← R 1 − b ∪ { Z ⊕ V b } D ← D ∪ { x } L b ( x ) ← V b , L 1 − b ( x ) ← Z ⊕ V b return V b Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM FWD Data : x ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n if x ∈ D then return L b ( x ) end Z ← $ ( x ) V b ← $ { 0 , 1 } n ∖ {R b ∪ { Z ⊕ R 1 − b }} R b ← R b ∪ { V b } , R 1 − b ← R 1 − b ∪ { Z ⊕ V b } D ← D ∪ { x } L b ( x ) ← V b , L 1 − b ( x ) ← Z ⊕ V b return V b Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM BCK Data : y ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n ∪ {⊥} if y = L b ( x ) for x ∈ D then return x D ′ ← D repeat V b ← $ { 0 , 1 } n ∖ D ′ , Z ← $ ( V b ) if Z ⊕ y ∉ R 1 − b then D ← D ∪ { V b } , R b ← R b ∪ { y } , L b ( V b ) ← y, R 1 − b ← R 1 − b ∪ { Z ⊕ y } , L 1 − b ( V b ) ← Z ⊕ y return V b end D ′ ← D ′ ∪ { V b } until n times ; return � Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM BCK Data : y ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n ∪ {⊥} if y = L b ( x ) for x ∈ D then return x D ′ ← D repeat V b ← $ { 0 , 1 } n ∖ D ′ , Z ← $ ( V b ) if Z ⊕ y ∉ R 1 − b then D ← D ∪ { V b } , R b ← R b ∪ { y } , L b ( V b ) ← y, R 1 − b ← R 1 − b ∪ { Z ⊕ y } , L 1 − b ( V b ) ← Z ⊕ y return V b end D ′ ← D ′ ∪ { V b } until n times ; return � Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM BCK Data : y ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n ∪ {⊥} if y = L b ( x ) for x ∈ D then return x D ′ ← D repeat V b ← $ { 0 , 1 } n ∖ D ′ , Z ← $ ( V b ) if Z ⊕ y ∉ R 1 − b then D ← D ∪ { V b } , R b ← R b ∪ { y } , L b ( V b ) ← y, R 1 − b ← R 1 − b ∪ { Z ⊕ y } , L 1 − b ( V b ) ← Z ⊕ y return V b end D ′ ← D ′ ∪ { V b } until n times ; return � Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM BCK Data : y ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n ∪ {⊥} if y = L b ( x ) for x ∈ D then return x D ′ ← D repeat V b ← $ { 0 , 1 } n ∖ D ′ , Z ← $ ( V b ) if Z ⊕ y ∉ R 1 − b then D ← D ∪ { V b } , R b ← R b ∪ { y } , L b ( V b ) ← y, R 1 − b ← R 1 − b ∪ { Z ⊕ y } , L 1 − b ( V b ) ← Z ⊕ y return V b end D ′ ← D ′ ∪ { V b } until n times ; return � Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM BCK Data : y ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n ∪ {⊥} if y = L b ( x ) for x ∈ D then return x D ′ ← D repeat V b ← $ { 0 , 1 } n ∖ D ′ , Z ← $ ( V b ) if Z ⊕ y ∉ R 1 − b then D ← D ∪ { V b } , R b ← R b ∪ { y } , L b ( V b ) ← y, R 1 − b ← R 1 − b ∪ { Z ⊕ y } , L 1 − b ( V b ) ← Z ⊕ y return V b end D ′ ← D ′ ∪ { V b } until n times ; return � Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM BCK Data : y ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n ∪ {⊥} if y = L b ( x ) for x ∈ D then return x D ′ ← D repeat V b ← $ { 0 , 1 } n ∖ D ′ , Z ← $ ( V b ) if Z ⊕ y ∉ R 1 − b then D ← D ∪ { V b } , R b ← R b ∪ { y } , L b ( V b ) ← y, R 1 − b ← R 1 − b ∪ { Z ⊕ y } , L 1 − b ( V b ) ← Z ⊕ y return V b end D ′ ← D ′ ∪ { V b } until n times ; return � Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Simulator for XORP Simulator Detail SIM BCK Data : y ∈ { 0 , 1 } n ,b ∈ { 0 , 1 } Result : V b ∈ { 0 , 1 } n ∪ {⊥} if y = L b ( x ) for x ∈ D then return x D ′ ← D repeat V b ← $ { 0 , 1 } n ∖ D ′ , Z ← $ ( V b ) if Z ⊕ y ∉ R 1 − b then D ← D ∪ { V b } , R b ← R b ∪ { y } , L b ( V b ) ← y, R 1 − b ← R 1 − b ∪ { Z ⊕ y } , L 1 − b ( V b ) ← Z ⊕ y return V b end D ′ ← D ′ ∪ { V b } until n times ; return � Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Transcript to the Adversary Additional Information Additional Information Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Transcript to the Adversary Additional Information Additional Information After the interation with real/ideal world is over Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Simulator and Transcript Transcript to the Adversary Additional Information Additional Information After the interation with real/ideal world is over A is given additional information. Real World Query: A knows the tuple ( x i , Π 0 ( x i ) , Π 1 ( x i )) = S i . Distributions: p fwd and p bck for forward and backward queries. 0 0 Ideal World Query: A knows the tuple ( x i ,V 0 ,i ,V 1 ,i ) (In case of ‘abort’ ( x i ,V 0 ,i ,V 1 ,i ) = � ). Distributions: p fwd and p bck for forward 1 1 and backward queries. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Outline Indifferentiability of XORP : Outline Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Outline Indifferentiability of XORP : Outline √ Theorem XORP , $ ( q ) ≤ 1 . 25 q Let N ≥ 16 and q < N 2 . Then Adv diff N . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Outline Indifferentiability of XORP : Outline √ Theorem XORP , $ ( q ) ≤ 1 . 25 q Let N ≥ 16 and q < N 2 . Then Adv diff N . Goal is to calculate Ex [ χ 2 ( S i − 1 )] over the real world distributions ( p fwd and p bck ). 0 0 Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Outline Indifferentiability of XORP : Outline √ Theorem XORP , $ ( q ) ≤ 1 . 25 q Let N ≥ 16 and q < N 2 . Then Adv diff N . Goal is to calculate Ex [ χ 2 ( S i − 1 )] over the real world distributions ( p fwd and p bck ). 0 0 Need to consider two cases. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Outline Indifferentiability of XORP : Outline √ Theorem XORP , $ ( q ) ≤ 1 . 25 q Let N ≥ 16 and q < N 2 . Then Adv diff N . Goal is to calculate Ex [ χ 2 ( S i − 1 )] over the real world distributions ( p fwd and p bck ). 0 0 Need to consider two cases. s i is a forward query Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Outline Indifferentiability of XORP : Outline √ Theorem XORP , $ ( q ) ≤ 1 . 25 q Let N ≥ 16 and q < N 2 . Then Adv diff N . Goal is to calculate Ex [ χ 2 ( S i − 1 )] over the real world distributions ( p fwd and p bck ). 0 0 Need to consider two cases. s i is a forward query s i is a backward query Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Forward Query Forward Query Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Forward Query Forward Query ( p fwd ( s i ∣ s i − 1 )− p fwd ( s i ∣ s i − 1 )) 2 χ 2 ( s i − 1 ) = ∑ s i . 0 1 ( s i ∣ s i − 1 ) p fwd 1 Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Forward Query Forward Query ( p fwd ( s i ∣ s i − 1 )− p fwd ( s i ∣ s i − 1 )) 2 χ 2 ( s i − 1 ) = ∑ s i . 0 1 ( s i ∣ s i − 1 ) p fwd 1 To consider χ 2 ( S i − 1 ) for real world distribution S i − 1 . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Forward Query Forward Query ( p fwd ( s i ∣ s i − 1 )− p fwd ( s i ∣ s i − 1 )) 2 χ 2 ( s i − 1 ) = ∑ s i . 0 1 ( s i ∣ s i − 1 ) p fwd 1 To consider χ 2 ( S i − 1 ) for real world distribution S i − 1 . Each S j ∈ { S i − 1 } may correspond to a forward or a backward query. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Forward Query Forward Query ( p fwd ( s i ∣ s i − 1 )− p fwd ( s i ∣ s i − 1 )) 2 χ 2 ( s i − 1 ) = ∑ s i . 0 1 ( s i ∣ s i − 1 ) p fwd 1 To consider χ 2 ( S i − 1 ) for real world distribution S i − 1 . Each S j ∈ { S i − 1 } may correspond to a forward or a backward query. The distributions p fwd and p bck are identical; the distribution of S i − 1 0 0 does not depend on the query type of each individual S j . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Forward Query Forward Query ( p fwd ( s i ∣ s i − 1 )− p fwd ( s i ∣ s i − 1 )) 2 χ 2 ( s i − 1 ) = ∑ s i . 0 1 ( s i ∣ s i − 1 ) p fwd 1 To consider χ 2 ( S i − 1 ) for real world distribution S i − 1 . Each S j ∈ { S i − 1 } may correspond to a forward or a backward query. The distributions p fwd and p bck are identical; the distribution of S i − 1 0 0 does not depend on the query type of each individual S j . Allows to treat χ 2 ( S i − 1 ) as a random variable and take its expectation under the distribution of S i − 1 . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Forward Query Forward Query ( p fwd ( s i ∣ s i − 1 )− p fwd ( s i ∣ s i − 1 )) 2 χ 2 ( s i − 1 ) = ∑ s i . 0 1 ( s i ∣ s i − 1 ) p fwd 1 To consider χ 2 ( S i − 1 ) for real world distribution S i − 1 . Each S j ∈ { S i − 1 } may correspond to a forward or a backward query. The distributions p fwd and p bck are identical; the distribution of S i − 1 0 0 does not depend on the query type of each individual S j . Allows to treat χ 2 ( S i − 1 ) as a random variable and take its expectation under the distribution of S i − 1 . Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Forward Query Forward Query ( p fwd ( s i ∣ s i − 1 )− p fwd ( s i ∣ s i − 1 )) 2 χ 2 ( s i − 1 ) = ∑ s i . 0 1 ( s i ∣ s i − 1 ) p fwd 1 To consider χ 2 ( S i − 1 ) for real world distribution S i − 1 . Each S j ∈ { S i − 1 } may correspond to a forward or a backward query. The distributions p fwd and p bck are identical; the distribution of S i − 1 0 0 does not depend on the query type of each individual S j . Allows to treat χ 2 ( S i − 1 ) as a random variable and take its expectation under the distribution of S i − 1 . Forward Query Bound i = 1 Ex [ χ 2 ( S i − 1 )] ≤ 8 q 3 ∑ q N 3 Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Backward Query Backward Query Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Backward Query Backward Query Steps are similar to the backward query case. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Main Result: Indifferentiability of XORP Result and Outline Backward Query Backward Query Steps are similar to the backward query case. s i ≠ ⊥ and s i = ⊥ are treated separately. Srimanta Bhattacharya and Mridul Nandi Full Indifferentiable Security of the Xor of Random Permutations
Recommend
More recommend