Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family
We present an attack on the SEAL Pseudorandom Function Family that is able to efficiently distinguish it from a truly random function with 243 bytes output. While this is not a practical attack on any use of SEAL, it does demonstrate that SEAL does not achieve its design goals.
- 1.Blahut, R., “Principles and Practice of Information Theory”, Addison-Wesley, 1983.Google Scholar
- 4.A. Menezes, P. van Oorschot, S. Vanstone, “Handbook of applied cryptography”, CRC Press, 1997Google Scholar
- 5.P. Rogaway, D. Coppersmith, “A software-optimized encryption algorithm”, Fast Software Encryption, Lecture Notes in Computer Science, Vol 809, Springer-Verlag, pp. 56–63.Google Scholar