CS 276 Lecture 6: Pseudorandom Functions and Permutations
Scribed by Ian Haken Summary The encryption scheme we saw last time, based on pseudorandom functions, works and is CPA-secure, but it is not used in practice. A disadvantage of the scheme is that the...
View ArticleCS276 Lecture 5: Encryption Using Pseudorandom Functions
Scribed by Manohar Jonnalagedda Summary Having introduced the notion of CPA security in the past lecture, we shall now see constructions that achieve it. Such constructions shall require either...
View ArticleCS276 Lecture 13 (draft)
Summary Today we complete the proof that it is possible to construct a pseudorandom generator from a one-way permutation 1. Pseudorandom Generators from One-Way Permutations Last time we proved the...
View ArticleCS276 Lecture 14 (draft)
Summary Today we show how to construct a pseudorandom function from a pseudorandom generator. 1. Construction of Pseudorandom Functions Lemma 1 (Generator Evaluated on Independent Seeds) Suppose that...
View ArticleCS276 Lecture 15 (draft)
Summary Today we give a construction of a pseudorandom permutation (block cipher) given a pseudorandom function, and we begin its analysis. 1. Feistel Permutations Let be a function. We define the...
View ArticleCS276 Lecture 16 (draft)
Today we finish the analysis of a construction of a pseudorandom permutation (block cipher) given a pseudorandom function. Recall that if is a function, then we define the Feistel permutation...
View ArticleCS276 Lecture 15: Pseudorandom Permutations
Scribed by Siu-Man Chan Summary Given one way permutations (of which discrete logarithm is a candidate), we know how to construct pseudorandom functions. Today, we are going to construct pseudorandom...
View ArticleCS276 Lecture 16: Pseudorandom Permutations
Scribed by Anupam Prakash Summary Today we finish the analysis of a construction of a pseudorandom permutation (block cipher) given a pseudorandom function. 1. The Luby-Rackoff Construction Recall...
View ArticleCS276 Lecture 14: Pseudorandom Functions from Pseudorandom Generators
Scribed by Madhur Tulsian Summary Today we show how to construct a pseudorandom function from a pseudorandom generator. 1. Pseudorandom generators evaluated on independent seeds We first prove a...
View Article