Papers
Topics
Authors
Recent
Search
2000 character limit reached

The Advantage of Truncated Permutations

Published 8 Oct 2016 in math.CO, cs.CR, and math.PR | (1610.02518v5)

Abstract: Constructing a Pseudo Random Function (PRF) is a fundamental problem in cryptology. Such a construction, implemented by truncating the last $m$ bits of permutations of ${0, 1}{n}$ was suggested by Hall et al. (1998). They conjectured that the distinguishing advantage of an adversary with $q$ queries, ${\bf Adv}{n, m} (q)$, is small if $q = o (2{(n+m)/2})$, established an upper bound on ${\bf Adv}{n, m} (q)$ that confirms the conjecture for $m < n/7$, and also declared a general lower bound ${\bf Adv}{n,m}(q)=\Omega(q2/2{n+m})$. The conjecture was essentially confirmed by Bellare and Impagliazzo (1999). Nevertheless, the problem of {\em estimating} ${\bf Adv}{n, m} (q)$ remained open. Combining the trivial bound $1$, the birthday bound, and a result of Stam (1978) leads to the upper bound \begin{equation*} {\bf Adv}{n,m}(q) = O\left(\min\left{\frac{q(q-1)}{2n},\,\frac{q}{2{\frac{n+m}{2}}},\,1\right}\right). \end{equation*} In this paper we show that this upper bound is tight for every $0\leq m<n$ and any $q$. This, in turn, verifies that the converse to the conjecture of Hall et al. is also correct, i.e., that ${\bf Adv}{n, m} (q)$ is negligible only for $q = o (2{(n+m)/2})$.

Citations (24)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (2)

Collections

Sign up for free to add this paper to one or more collections.