Skip to main content
  • 143 Accesses

Related Concepts

One-Way Function; Pseudorandom Number Generator

Definition

A hard-core bit of a one-way function y = f(x) is any bit or other binary function of the input x that is hard to compute significantly better than guessing given the output y alone.

Theory

Let f be a one-way function. According to the definition of such a function, it is difficult, given y = f(x), where x is random, to recover x. However, it may be easy to determine certain information about x. For instance, the RSA function \(f(x) = {x}^{e}\) mod n (RSA public-key encryption) is believed to be one-way, yet it is easy to compute the Jacobi symbol of x, given f(x):

$$ \left (\frac{{x}^{e}\mathrm{mod}\ n} {n} \right ) ={ \left (\frac{x} {n}\right )}^{e} = \left (\frac{x} {n}\right ). $$

Another example is found in the discrete exponentiation function \(f(x) = {g}^{x}\) mod p (discrete logarithm problem), where the least-significant bit of x is revealed from the Legendre symbol of f(x), i.e., \(f{(x)}^{(p-1)/2}\)...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Alexi WB, Chor B, Goldreich O, Schnorr C-P (1988) RSA and Rabin functions: certain parts are as hard as the whole. SIAM J Comput 17(2):194–209

    Article  MATH  MathSciNet  Google Scholar 

  2. Blum M, Micali S (1984) How to generate cryptographically strong sequences of pseudo-random bits. SIAM J Comput 13(4):850–863

    Article  MATH  MathSciNet  Google Scholar 

  3. Goldreich O, Levin L (1989) A hard-core predicate for all one-way functions. In: Proceedings of the 21st annual ACM symposium on theory of computing. ACM, New York, pp 25–32

    Google Scholar 

  4. Håstad J, Näslund M (2004) The security of all RSA and discrete log bits. J ACM 51(2):187–230

    Article  MathSciNet  Google Scholar 

  5. Håstad J, Schrift AW, Shamir A (1993) The discrete logarithm modulo a composite hides O(n) bits. J Comput Syst Sci 47(3):376–404

    Article  MATH  Google Scholar 

  6. Yao A (1982) Theory and applications of trapdoor functions. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society Press, Los Alamitos, pp 80–91

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Kaliski, B. (2011). Hard-Core Bit. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_412

Download citation

Publish with us

Policies and ethics