Cargando…
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
The Coefficients H technique (also called the H-technique), developed by Patarin circa 1991, is a tool used to obtain the upper bounds on distinguishing advantages. This tool is known to provide relatively simple and (in some cases) tight bound proofs in comparison to some other well-known tools, su...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9026519/ https://www.ncbi.nlm.nih.gov/pubmed/35455125 http://dx.doi.org/10.3390/e24040462 |
_version_ | 1784691142004047872 |
---|---|
author | Jha, Ashwin Nandi, Mridul |
author_facet | Jha, Ashwin Nandi, Mridul |
author_sort | Jha, Ashwin |
collection | PubMed |
description | The Coefficients H technique (also called the H-technique), developed by Patarin circa 1991, is a tool used to obtain the upper bounds on distinguishing advantages. This tool is known to provide relatively simple and (in some cases) tight bound proofs in comparison to some other well-known tools, such as the game-playing technique and random systems methodology. In this systematization of knowledge (SoK) paper, we aim to provide a brief survey on the H-technique. The SoK is presented in four parts. First, we redevelop the necessary nomenclature and tools required to study the security of any symmetric-key design, especially in the H-technique setting. Second, we provide a full description of the H-technique and some related tools. Third, we present (simple) H-technique-based proofs for some popular symmetric-key designs, across different paradigms. Finally, we show that the H-technique can actually provide optimal bounds on distinguishing advantages. |
format | Online Article Text |
id | pubmed-9026519 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-90265192022-04-23 A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF Jha, Ashwin Nandi, Mridul Entropy (Basel) Article The Coefficients H technique (also called the H-technique), developed by Patarin circa 1991, is a tool used to obtain the upper bounds on distinguishing advantages. This tool is known to provide relatively simple and (in some cases) tight bound proofs in comparison to some other well-known tools, such as the game-playing technique and random systems methodology. In this systematization of knowledge (SoK) paper, we aim to provide a brief survey on the H-technique. The SoK is presented in four parts. First, we redevelop the necessary nomenclature and tools required to study the security of any symmetric-key design, especially in the H-technique setting. Second, we provide a full description of the H-technique and some related tools. Third, we present (simple) H-technique-based proofs for some popular symmetric-key designs, across different paradigms. Finally, we show that the H-technique can actually provide optimal bounds on distinguishing advantages. MDPI 2022-03-26 /pmc/articles/PMC9026519/ /pubmed/35455125 http://dx.doi.org/10.3390/e24040462 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Jha, Ashwin Nandi, Mridul A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF |
title | A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF |
title_full | A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF |
title_fullStr | A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF |
title_full_unstemmed | A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF |
title_short | A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF |
title_sort | survey on applications of h-technique: revisiting security analysis of prp and prf |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9026519/ https://www.ncbi.nlm.nih.gov/pubmed/35455125 http://dx.doi.org/10.3390/e24040462 |
work_keys_str_mv | AT jhaashwin asurveyonapplicationsofhtechniquerevisitingsecurityanalysisofprpandprf AT nandimridul asurveyonapplicationsofhtechniquerevisitingsecurityanalysisofprpandprf AT jhaashwin surveyonapplicationsofhtechniquerevisitingsecurityanalysisofprpandprf AT nandimridul surveyonapplicationsofhtechniquerevisitingsecurityanalysisofprpandprf |