Skip to main content

A construction of a cipher from a single pseudorandom permutation

  • Conference paper
  • First Online:
Advances in Cryptology — ASIACRYPT '91 (ASIACRYPT 1991)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 739))

Included in the following conference series:

Abstract

Shannon defined a random cipher as a collection of randomly chosen permutations, one for each value of the key.

We suggest a scheme for a block cipher which uses only one randomly chosen permutation, F. The key, consisting of two blocks, K 1 and K 2 is used in the following way: The message block is XORed with K 1 before applying F, and the outcome is XORed with K 2, to produce the cryptogram block. This removes the need to store, or generate a multitude of permutations.

Although the resulting cipher is not random, we claim that it is secure. First, it is shown that if F is chosen randomly then, with high probability the scheme is secure against any polynomial-time algorithmic attack. Next, it is shown that if F is chosen pseudorandomly, the system remains secure against oracle-type attacks.

The scheme may lead to a system more efficient than systems such as the DES and its siblings, since the designer has to worry about one thing only: How to implement one pseudorandomly chosen permutation. This may be easier than getting one for each key.

Supported by the Fund for the Promotion of Research at the Technion, and by Bellcore, Morristown, NJ.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C.E. Shannon, “Communication Theory of Secrecy Systems”, Bell System Tech. J., Vol. 28, 1949, pp. 656–715.

    Google Scholar 

  2. National Bureau of Standards, “Data Encryption Standard”, Federal Information Processing Standard, U.S. Department of CommerceFIPS PUB 46, Washington, DC, 1977.

    Google Scholar 

  3. M. Luby and C. Rackoff, “How to Construct Pseudorandom Permutations from Pseudorandom Functions”, SIAM J. on Computing, Vol. 17, No. 2, 1988, pp. 373–386.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hideki Imai Ronald L. Rivest Tsutomu Matsumoto

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Even, S., Mansour, Y. (1993). A construction of a cipher from a single pseudorandom permutation. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-57332-1_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57332-6

  • Online ISBN: 978-3-540-48066-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics