Nov. 3, 2023, 2:24 a.m. |

IACR News www.iacr.org

ePrint Report: Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs

Wonseok Choi, Minki Hhan, Yu Wei, Vassilis Zikas


Security proofs of symmetric-key primitives typically consider an idealized world with access to a (uniformly) random function. The starting point of our work is the observation that such an ideal world leads to underestimating the actual security of certain primitives. As a demonstrating example, $\mathsf{XoP2}$, which relies on two independent random permutations, is proven to exhibit far superior concrete security …

access eprint report fine-tuning function key point random report security symmetric wei work world xor

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information System Security Engineer 2

@ Wyetech | Annapolis Junction, Maryland

Staff Vulnerability/Configuration Management Security Engineer

@ ServiceNow | Hyderabad, India

Security Engineer

@ AXS | London, England, UK