Cargando…

A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF

The Coefficients H technique (also called the H-technique), developed by Patarin circa 1991, is a tool used to obtain the upper bounds on distinguishing advantages. This tool is known to provide relatively simple and (in some cases) tight bound proofs in comparison to some other well-known tools, su...

Descripción completa

Detalles Bibliográficos
Autores principales: Jha, Ashwin, Nandi, Mridul
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9026519/
https://www.ncbi.nlm.nih.gov/pubmed/35455125
http://dx.doi.org/10.3390/e24040462
_version_ 1784691142004047872
author Jha, Ashwin
Nandi, Mridul
author_facet Jha, Ashwin
Nandi, Mridul
author_sort Jha, Ashwin
collection PubMed
description The Coefficients H technique (also called the H-technique), developed by Patarin circa 1991, is a tool used to obtain the upper bounds on distinguishing advantages. This tool is known to provide relatively simple and (in some cases) tight bound proofs in comparison to some other well-known tools, such as the game-playing technique and random systems methodology. In this systematization of knowledge (SoK) paper, we aim to provide a brief survey on the H-technique. The SoK is presented in four parts. First, we redevelop the necessary nomenclature and tools required to study the security of any symmetric-key design, especially in the H-technique setting. Second, we provide a full description of the H-technique and some related tools. Third, we present (simple) H-technique-based proofs for some popular symmetric-key designs, across different paradigms. Finally, we show that the H-technique can actually provide optimal bounds on distinguishing advantages.
format Online
Article
Text
id pubmed-9026519
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-90265192022-04-23 A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF Jha, Ashwin Nandi, Mridul Entropy (Basel) Article The Coefficients H technique (also called the H-technique), developed by Patarin circa 1991, is a tool used to obtain the upper bounds on distinguishing advantages. This tool is known to provide relatively simple and (in some cases) tight bound proofs in comparison to some other well-known tools, such as the game-playing technique and random systems methodology. In this systematization of knowledge (SoK) paper, we aim to provide a brief survey on the H-technique. The SoK is presented in four parts. First, we redevelop the necessary nomenclature and tools required to study the security of any symmetric-key design, especially in the H-technique setting. Second, we provide a full description of the H-technique and some related tools. Third, we present (simple) H-technique-based proofs for some popular symmetric-key designs, across different paradigms. Finally, we show that the H-technique can actually provide optimal bounds on distinguishing advantages. MDPI 2022-03-26 /pmc/articles/PMC9026519/ /pubmed/35455125 http://dx.doi.org/10.3390/e24040462 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Jha, Ashwin
Nandi, Mridul
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
title A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
title_full A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
title_fullStr A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
title_full_unstemmed A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
title_short A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
title_sort survey on applications of h-technique: revisiting security analysis of prp and prf
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9026519/
https://www.ncbi.nlm.nih.gov/pubmed/35455125
http://dx.doi.org/10.3390/e24040462
work_keys_str_mv AT jhaashwin asurveyonapplicationsofhtechniquerevisitingsecurityanalysisofprpandprf
AT nandimridul asurveyonapplicationsofhtechniquerevisitingsecurityanalysisofprpandprf
AT jhaashwin surveyonapplicationsofhtechniquerevisitingsecurityanalysisofprpandprf
AT nandimridul surveyonapplicationsofhtechniquerevisitingsecurityanalysisofprpandprf