Foundation of Cryptography (0368-4162-01), Lecture 2
Pseudorandom Generators Iftach Haitner, Tel Aviv University
Tel Aviv University.
February 25, 2014
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 1 / 26
Foundation of Cryptography (0368-4162-01), Lecture 2 Pseudorandom - - PowerPoint PPT Presentation
Foundation of Cryptography (0368-4162-01), Lecture 2 Pseudorandom Generators Iftach Haitner, Tel Aviv University Tel Aviv University. February 25, 2014 Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 1 / 26 Part I
Tel Aviv University.
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 1 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 2 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 3 / 26
S⊆U (P(S) − Q(S))
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 4 / 26
S⊆U (P(S) − Q(S))
D { Pr x←P[D(x) = 1] − Pr x←Q[D(x) = 1]},
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 4 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 5 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 6 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 6 / 26
(P,Q)(n)
(P,Q)(n) :=
x←Pn[D(1n, x) = 1] − Pr x←Qn[D(1n, x) = 1]
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 6 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 7 / 26
(P,Q)(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 8 / 26
(P,Q)(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 8 / 26
(P,Q)(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 8 / 26
(P,Q)(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 8 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 9 / 26
(P2,Q2)(n)
Foundation of Cryptography February 25, 2014 9 / 26
(P2,Q2)(n)
x←P2
n
x←Q2
n
x←P2
n
x←(Pn,Qn)[D(x) = 1]
x←(Pn,Qn)[D(x) = 1] −
x←Q2
n
Foundation of Cryptography February 25, 2014 9 / 26
(P2,Q2)(n)
x←P2
n
x←Q2
n
x←P2
n
x←(Pn,Qn)[D(x) = 1]
x←(Pn,Qn)[D(x) = 1] −
x←Q2
n
(P2,(P,Q)(n)
((P,Q),Q2)(n)
Foundation of Cryptography February 25, 2014 9 / 26
(P2,Q2)(n)
x←P2
n
x←Q2
n
x←P2
n
x←(Pn,Qn)[D(x) = 1]
x←(Pn,Qn)[D(x) = 1] −
x←Q2
n
(P2,(P,Q)(n)
((P,Q),Q2)(n)
(P2,(P,Q)(n)| ≥ δ(n)/2, or |∆D ((P,Q),Q2)(n)| ≥ δ(n)/2
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 9 / 26
(P2,Q2)(n)
P2,(P,Q)(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 10 / 26
(P2,Q2)(n)
P2,(P,Q)(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 10 / 26
(P2,Q2)(n)
P2,(P,Q)(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 10 / 26
(P2,Q2)(n)
P2,(P,Q)(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 10 / 26
n
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 11 / 26
n
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 11 / 26
n
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 11 / 26
n
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 11 / 26
n
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 11 / 26
(Pt,Qt)(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 12 / 26
(Pt,Qt)(n)
Ht,H0(t)
Hi,Hi−1(t)
Hi,Hi−1(t)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 12 / 26
(Pt,Qt)(n)
Ht,H0(t)
Hi,Hi−1(t)
Hi,Hi−1(t)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 12 / 26
1
Hi,Hi−1(t)
2
3
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 13 / 26
1
Hi,Hi−1(t)
2
3
1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 13 / 26
1
Hi,Hi−1(t)
2
3
1
2
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 13 / 26
1
2
3
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 14 / 26
1
2
3
(P,Q)(n)
p←Pn[D′(p) = 1] − Pr q←Qn[D′(q) = 1]
Foundation of Cryptography February 25, 2014 14 / 26
1
2
3
(P,Q)(n)
p←Pn[D′(p) = 1] − Pr q←Qn[D′(q) = 1]
x←Hi
x←Hi−1
Foundation of Cryptography February 25, 2014 14 / 26
1
2
3
(P,Q)(n)
p←Pn[D′(p) = 1] − Pr q←Qn[D′(q) = 1]
x←Hi
x←Hi−1
x←Ht
x←H0
Foundation of Cryptography February 25, 2014 14 / 26
1
2
3
(P,Q)(n)
p←Pn[D′(p) = 1] − Pr q←Qn[D′(q) = 1]
x←Hi
x←Hi−1
x←Ht
x←H0
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 14 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 15 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 16 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 16 / 26
◮ g is length extending (i.e., ℓ(n) > n for any n) ◮ g(Un) is pseudorandom Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 16 / 26
◮ g is length extending (i.e., ℓ(n) > n for any n) ◮ g(Un) is pseudorandom
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 16 / 26
◮ g is length extending (i.e., ℓ(n) > n for any n) ◮ g(Un) is pseudorandom
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 16 / 26
◮ g is length extending (i.e., ℓ(n) > n for any n) ◮ g(Un) is pseudorandom
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 16 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 17 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 18 / 26
x←{0,1}n [P(f(x)) = b(x)] ≤ 1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 18 / 26
x←{0,1}n [P(f(x)) = b(x)] ≤ 1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 18 / 26
x←{0,1}n [P(f(x)) = b(x)] ≤ 1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 18 / 26
x←{0,1}n [P(f(x)) = b(x)] ≤ 1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 18 / 26
x←{0,1}n [P(f(x)) = b(x)] ≤ 1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 18 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 19 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 20 / 26
g(Un),Un+1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 20 / 26
g(Un),Un+1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 20 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 21 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 21 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 21 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 21 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 22 / 26
1
2
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 22 / 26
1
2
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 22 / 26
1
2
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 22 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 23 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 23 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 24 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 25 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 25 / 26
gt(Un),Un+t(n)
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 25 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 26 / 26
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 26 / 26
1
2
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 26 / 26
1
2
g(Un),Un+1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 26 / 26
1
2
g(Un),Un+1
Iftach Haitner (TAU) Foundation of Cryptography February 25, 2014 26 / 26