In 1997,
Moni Naor
Moni Naor ( he, מוני נאור) is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science. Naor received his Ph.D. in 1989 at the University of California, Berkeley. His advisor was Manuel Blum.
He works i ...
and
Omer Reingold described efficient constructions for various
cryptographic primitive
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hash functions an ...
s in private key as well as
public-key cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic a ...
. Their result is the construction of an efficient
pseudorandom function. Let ''p'' and ''l'' be
prime number
A prime number (or a prime) is a natural number greater than 1 that is not a product of two smaller natural numbers. A natural number greater than 1 that is not prime is called a composite number. For example, 5 is prime because the only way ...
s with ''l'' , ''p''−1. Select an element ''g'' ∈
of
multiplicative order In number theory, given a positive integer ''n'' and an integer ''a'' coprime to ''n'', the multiplicative order of ''a'' modulo ''n'' is the smallest positive integer ''k'' such that a^k\ \equiv\ 1 \pmod n.
In other words, the multiplicative orde ...
''l''. Then for each ''(n+1)''-dimensional
vector
Vector most often refers to:
*Euclidean vector, a quantity with a magnitude and a direction
*Vector (epidemiology), an agent that carries and transmits an infectious pathogen into another living organism
Vector may also refer to:
Mathematic ...
''a'' = (''a''
''0'''',a''
''1'', ..., ''a''
''n'')∈
they define the function
:
where ''x'' = ''x''
''1'' ... ''x''
''n'' is the
bit representation of integer ''x'', 0 ≤ ''x'' ≤ 2
''n''−1, with some extra leading zeros if necessary.
Example
Let ''p'' = 7 and ''l'' = 3; so ''l'' , ''p''−1. Select ''g'' = 4 ∈
of multiplicative order 3 (since 4
3 = 64 ≡ 1 mod 7). For ''n'' = 3, ''a'' = (1, 1, 2, 1) and ''x'' = 5 (the bit representation of 5 is 101), we can compute
as follows:
:
:
Efficiency
The evaluation of function
in the Naor–Reingold construction can be done very efficiently. Computing the value of the function
at any given point is comparable with one
modular exponentiation
Modular exponentiation is exponentiation performed over a modulus. It is useful in computer science, especially in the field of public-key cryptography, where it is used in both Diffie-Hellman Key Exchange and RSA public/private keys.
Modul ...
and n-modular multiplications. This function can be computed in parallel by threshold circuits of bounded depth and polynomial size.
The Naor–Reingold function can be used as the basis of many
cryptographic
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
schemes including
symmetric encryption
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between t ...
,
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
and
digital signatures
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very high confidence that the message was created b ...
.
Security of the function
Assume that an attacker sees several outputs of the function, e.g.
, ...
and wants to compute
. Assume for simplicity that ''x''
1 = 0, then the attacker needs to solve the
computational Diffie–Hellman (CDH) between
and
to get
. In general, moving from ''k'' to ''k'' + 1 changes the bit pattern and unless ''k'' + 1 is a power of 2 one can split the exponent in
so that the computation corresponds to computing the
Diffie–Hellman key between two of the earlier results. This attacker wants to predict the next
sequence
In mathematics, a sequence is an enumerated collection of objects in which repetitions are allowed and order matters. Like a set, it contains members (also called ''elements'', or ''terms''). The number of elements (possibly infinite) is called ...
element. Such an attack would be very bad—but it's also possible to fight it off by working in
groups with a hard
Diffie–Hellman problem
The Diffie–Hellman problem (DHP) is a mathematical problem first proposed by Whitfield Diffie and Martin Hellman in the context of cryptography. The motivation for this problem is that many security systems use one-way functions: mathematical ...
(DHP).
Example:
An attacker sees several outputs of the function e.g.
, as in the previous example, and
. Then, the attacker wants to predict the next sequence element of this function,
. However, the attacker cannot predict the outcome of
from knowing
and
.
There are other attacks that would be very bad for a
pseudorandom number generator
A pseudorandom number generator (PRNG), also known as a deterministic random bit generator (DRBG), is an algorithm for generating a sequence of numbers whose properties approximate the properties of sequences of random numbers. The PRNG-generate ...
: the user expects to get random numbers from the output, so of course the stream should not be predictable, but even more, it should be indistinguishable from a random string. Let
denote the algorithm
with access to an oracle for evaluating the function
. Suppose the
decisional Diffie–Hellman assumption holds for
, Naor and Reingold show that for every
probabilistic polynomial time
In Computational complexity theory, complexity theory, PP is the class of decision problems solvable by a probabilistic Turing machine in polynomial time, with an error probability of less than 1/2 for all instances. The abbreviation PP refers to ...
algorithm
and sufficiently large ''n''
:
is
negligible.
The first probability is taken over the choice of the seed s = (p, g, a) and the second probability is taken over the random distribution induced on p, g by
, instance generator, and the random choice of the function
among the set of all
functions.
Linear complexity
One natural measure of how useful a sequence may be for
cryptographic
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
purposes is the size of its linear complexity. The linear complexity of an ''n''-element sequence W(''x''), ''x'' = 0,1,2,...,''n'' – 1, over a ring
is the length ''l'' of the shortest linear
recurrence relation
In mathematics, a recurrence relation is an equation according to which the nth term of a sequence of numbers is equal to some combination of the previous terms. Often, only k previous terms of the sequence appear in the equation, for a paramete ...
W(''x'' + ''l'') = A
''l''−1 W(''x'' +''l''−1) + ... + A
0 W(''x''), ''x'' = 0,1,2,..., ''n'' – ''l'' −1 with A
0, ..., A
''l''−1 ∈
, which is satisfied by this sequence.
For some
> 0,''n'' ≥ (1+
)
, for any
, sufficiently large ''l'', the linear complexity of the sequence
,0 ≤ x ≤ 2
n-1, denoted by
satisfies
:
for all except possibly at most
vectors a ∈
.
The bound of this work has disadvantages, namely it does not apply to the very interesting case
Uniformity of distribution
The statistical distribution of
is exponentially close to
uniform distribution for almost all vectors ''a'' ∈
.
Let
be the
discrepancy
Discrepancy may refer to:
Mathematics
* Discrepancy of a sequence
* Discrepancy theory in structural modelling
* Discrepancy of hypergraphs, an area of discrepancy theory
* Discrepancy (algebraic geometry)
Statistics
* Discrepancy function in th ...
of the set
. Thus, if
is the bit length of ''p'' then for all vectors a ∈
the bound
holds, where
:
and
:
Although this property does not seem to have any immediate cryptographic implications, the inverse fact, namely non uniform distribution, if true would have disastrous consequences for applications of this function.
Sequences in elliptic curve
The
elliptic curve
In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If ...
version of this function is of interest as well. In particular, it may help to improve the cryptographic security of the corresponding system. Let ''p'' > 3 be prime and let E be an elliptic curve over
, then each vector a defines a
finite sequence
In mathematics, a sequence is an enumerated collection of objects in which repetitions are allowed and order matters. Like a set, it contains members (also called ''elements'', or ''terms''). The number of elements (possibly infinite) is called th ...
in the
subgroup
In group theory, a branch of mathematics, given a group ''G'' under a binary operation ∗, a subset ''H'' of ''G'' is called a subgroup of ''G'' if ''H'' also forms a group under the operation ∗. More precisely, ''H'' is a subgrou ...
as:
:
where
is the bit representation of integer
.
The Naor–Reingold elliptic curve sequence is defined as
:
If the
decisional Diffie–Hellman assumption holds, the index ''k'' is not enough to compute
in polynomial time, even if an attacker performs polynomially many queries to a random oracle.https://en.wikipedia.org/wiki/Elliptic_curve
See also
*
Decisional Diffie–Hellman assumption
*
Finite field
In mathematics, a finite field or Galois field (so-named in honor of Évariste Galois) is a field that contains a finite number of elements. As with any field, a finite field is a set on which the operations of multiplication, addition, subt ...
*
Inversive congruential generator
*
Generalized inversive congruential pseudorandom numbers An approach to nonlinear congruential methods of generating uniform pseudorandom numbers in the interval primes p_1,\dots ,p_r \ge 5 will be present here.
Let \mathbb_ = \ . For integers a,b \in \mathbb_ with gcd (a,m) = 1 a generalized in ...
Notes
References
*.
*
*
{{DEFAULTSORT:Naor-Reingold pseudorandom function
Pseudorandom number generators
Cryptography