Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
How to construct pseudorandom permutations from pseudorandom functions
Luby M. (ed), Rackoff C. SIAM Journal on Computing17 (2):373-386,1988.Type:Article
Date Reviewed: Jul 1 1989

The authors’ main purpose in this paper is to propose an efficient strategy for the construction of a pseudorandom invertible permutation generator from a pseudorandom function generator. By combining this strategy with the previous result that a pseudorandom function generator can be built efficiently from a pseudorandom bit generator, the authors provide a ready method for the design of a block private key cryptosystem that is secure against chosen plaintext attack. Their correctness proofs and method of construction are elegant, and their presentation is excellent and fairly self-contained. Another important contribution of this paper is a more formal and mathematical description of the concepts of the well-known data encryption standard (DES) cryptographic methodology.

The reader will need a reasonable amount of mathematical maturity, as well as a familiarity with complexity theory and combinatorics, to make complete sense of this paper. The authors provide precise and formal definitions for most of the terms and concepts in the area of cryptosystems security, and they largely succeed in giving a theoretical justification for the apparent security of the DES system. Anyone interested in the security of cryptosystems would benefit from reading this paper, even if she or he is not interested in the detailed mathematical proofs.

Reviewer:  Pradip K. Srimani Review #: CR112921
Bookmark and Share
 
Permutations And Combinations (G.2.1 ... )
 
 
Data Encryption Standard (DES) (E.3 ... )
 
 
Generating Functions (G.2.1 ... )
 
 
Probability And Statistics (G.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Permutations And Combinations": Date
Computing short generator sequences
Driscoll J., Furst M. Information and Computation 72(2): 117-132, 1987. Type: Article
Jan 1 1988
Permutations of bounded degree generate groups of polynomial diameter
McKenzie P. (ed) Information Processing Letters 19(5): 253-254, 1984. Type: Article
Aug 1 1985
Classes of admissible permutations that are generatable by depth-first traversals of ordered trees
Er M. The Computer Journal 32(1): 76-85, 1989. Type: Article
Nov 1 1989
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy