Paper 2026/336

How to Build a Short-Input Random Oracle from Public Random Permutations

Ritam Bhaumik, Technology Innovation Institute, Abu Dhabi, UAE
Nilanjan Datta, Institute for Advancing Intelligence (IAI), TCG CREST, Kolkata, India, Academy of Scientific and Innovative Research (AcSIR), Ghaziabad, India
Avijit Dutta, Institute for Advancing Intelligence (IAI), TCG CREST, Kolkata, India, Academy of Scientific and Innovative Research (AcSIR), Ghaziabad, India
Ashwin Jha, Ruhr University Bochum, Bochum, Germany
Sougata Mandal, Institute for Advancing Intelligence (IAI), TCG CREST, Kolkata, India, Ramakrishna Mission Vivekananda Educational and Research Institute, Belur, India
Bart Mennink, Maastricht University, Maastricht, Netherlands
Hrithik Nandi, Institute for Advancing Intelligence (IAI), TCG CREST, Kolkata, India, Ramakrishna Mission Vivekananda Educational and Research Institute, Belur, India
Yaobin Shen, Xiamen University, Xiamen, China
Abstract

A vast body of work studies how to build a pseudorandom function (PRF) from a pseudorandom permutation (PRP) with beyond-the-birthday-bound (BBB) security. Often, such constructions are also expected to offer some security in keyless settings, for example in the context of committing security or to substitute a parallelizable short-input random oracle (RO) if used in counter mode. This has spurred several works on keyless variants of PRP-to-PRF constructions. However, recent works (Gunsing et al., CRYPTO 2022, 2023) reveal flaws in almost all existing proofs, painting a grim picture. This paper clarifies the situation with an in-depth analysis of RP-based short-input RF constructions. First, we categorize all two-call short-input/output RP-to-RF constructions and evaluate their indifferentiability level. We introduce the "chaining attack'', a powerful, widely applicable differentiability attack. When applied to the sum of a permutation and its inverse, it invalidates an earlier result (Dodis et al., EUROCRYPT 2008). On the positive side, we show that only the Sum Of Permutations and Encrypted Davies-Meyer Dual, when instantiated with independent permutations, achieve BBB security and could potentially yield a parallelizable short-input RO. Second, we study the indifferentiability of expanding RP-to-RF constructions and show that $\mathtt{XORP}_w$, the core PRF underlying $\textsf{CENC}$, achieves BBB security. As side effects, we obtain a simplified proof of indifferentiability for Sum of Permutations, and the committing security of $\textsf{CENC}$.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
A major revision of an IACR publication in EUROCRYPT 2026
Keywords
indifferentiabilityRP-to-RF conversionshort-input RObeyond birthday-boundkey commitment
Contact author(s)
bhaumik ritam @ gmail com
nilanjan datta @ tcgcrest org
avirocks dutta13 @ gmail com
ashwin jha @ outlook de
sougatamandal2014 @ gmail com
bart mennink @ maastrichtuniversity nl
hrithiknandi crypto @ gmail com
yaobin shen @ xmu edu cn
History
2026-02-23: revised
2026-02-20: received
See all versions
Short URL
https://ia.cr/2026/336
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2026/336,
      author = {Ritam Bhaumik and Nilanjan Datta and Avijit Dutta and Ashwin Jha and Sougata Mandal and Bart Mennink and Hrithik Nandi and Yaobin Shen},
      title = {How to Build a Short-Input Random Oracle from Public Random Permutations},
      howpublished = {Cryptology {ePrint} Archive, Paper 2026/336},
      year = {2026},
      url = {https://eprint.iacr.org/2026/336}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.