Question: 6 . 4 . Let F be a secure PRF with in = 2 , and let G be a length - doubling PRG .

6.4. Let F be a secure PRF with in =2, and let G be a length-doubling PRG. Define
F'(k,x)=F(k,G(x)).
We will see that F' is not necessarily a PRF.
(a) Prove that if G is injective then F' is a secure PRF.
***(b) Exercise 5.9(b) constructs a secure length-doubling PRG that ignores half of its input.
Show that F' is insecure when instantiated with such a PRG. Give a distinguisher and
compute its advantage.
Note: You are not attacking the PRF security of F, nor the PRG security of G. You are
attacking the invalid way in which they have been combined.
 6.4. Let F be a secure PRF with in =2, and

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!