Question: Suppose F is a secure PRF with input length in , but we want to use it to construct another PRF F with a longer
Suppose F is a secure PRF with input length in but we want to use it to construct another PRF F with a longer input length. Below are some approaches that dont work. For each one, describe a successful distinguishing attack and compute its advantage:
a F k xx F k xF k x where x and x are each in bits long.
b Fkkxx Fkx x Fkx x where x and x are each in bits long, and k and k
belong to the key space of F
c F k xx F kx F kx where x and x are each in bits lon
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
