Answered step by step
Verified Expert Solution
Question
1 Approved Answer
In practice, a common use of SHA 3 is to assume that it is a PRG . Let s consider { 0 , 1 }
In practice, a common use of SHA is to assume that it is a PRG Lets consider
as the input domain and as the output domain of to SHA
as the following
SHA G:
I.e we denote SHA as G
Now we want to use this to generate more pseudorandom bits as G :
Particularly, G on input r in works as follows:
First compute r r Gr where r in r in and
denotes concatenation.
Then compute r Gr Gr in
Output r
Our goal is to show that the output of G is also pseudorandom, ie
GU is computationally indistinguishable from U where Um denotes the
uniform distribution of m bits. Below we divide this into the following subtasks.
Subtasks: Consider the following hybrids distributions:
H: this is the output distribution of G given a random input in U
ie Gr Gr Gr where r r Gr and r U
H: this is a modified version of H The output of H is Gr Gr
where both r U and r U ie they are both truly uniform
strings. This is the only difference between H and H
H: this is a modified version of H The output of this variant is r
Gr
where r
U is truly random, and r U
H: this is a truly uniform string, ie U
Show that each adjacent hybrids are computationally indistinguishable, un
der the assumption that G is a secure PRG That is you need to prove Hc
Hc Hc H Then argue why this suffices to show our overall goal
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started