Table of Contents
Fetching ...

Cryptanalysis of the Legendre Pseudorandom Function over Extension Fields

Daksh Pandey

Abstract

The Legendre Pseudorandom Function (PRF) is a highly efficient cryptographic primitive built upon the Legendre symbol, valued for its low multiplicative complexity in Multi-Party Computation (MPC) and Zero-Knowledge Proof (ZKP) protocols. While its security over prime fields $\mathbb{F}_p$ is well-documented, recent interest has shifted toward instantiations over extension fields $\mathbb{F}_{p^r}$. This paper presents the first comprehensive cryptanalysis of the single-degree Legendre PRF operating over $\mathbb{F}_{p^r}$. First, we analyze polynomial input encoding under a standard passive threat model (sequential additive counter queries). We demonstrate that while the absence of polynomial carry-overs causes an asynchronous "no-carry fracture" that neutralizes classical sliding-window collision attacks, the fracture itself is deterministically periodic. By introducing a novel "Differential Signature" bucketing technique, we prove that an adversary can systematically group fractured sequences by their structural shapes to bypass this defense, recovering the secret key in $\mathcal{O}(U \cdot p^r/M)$ operations, where $U$ is the unicity distance. Second, we evaluate the PRF under an active Chosen-Query threat model. We demonstrate that an adversary can circumvent the additive fracture by evaluating the PRF along a geometric sequence generated by a primitive polynomial. This structure invokes strict multiplicative homomorphism over $\mathbb{F}^*_{p^r}$, permitting a direct generalization of state-of-the-art table collision attacks to extract the key in $\mathcal{O}(p^r/M)$ operations. Finally, we establish the cryptographic boundaries of these attacks, formally proving the necessity of higher-degree key variants ($d \ge 2$) to achieve exponential security against structural reduction in extension fields.

Cryptanalysis of the Legendre Pseudorandom Function over Extension Fields

Abstract

The Legendre Pseudorandom Function (PRF) is a highly efficient cryptographic primitive built upon the Legendre symbol, valued for its low multiplicative complexity in Multi-Party Computation (MPC) and Zero-Knowledge Proof (ZKP) protocols. While its security over prime fields is well-documented, recent interest has shifted toward instantiations over extension fields . This paper presents the first comprehensive cryptanalysis of the single-degree Legendre PRF operating over . First, we analyze polynomial input encoding under a standard passive threat model (sequential additive counter queries). We demonstrate that while the absence of polynomial carry-overs causes an asynchronous "no-carry fracture" that neutralizes classical sliding-window collision attacks, the fracture itself is deterministically periodic. By introducing a novel "Differential Signature" bucketing technique, we prove that an adversary can systematically group fractured sequences by their structural shapes to bypass this defense, recovering the secret key in operations, where is the unicity distance. Second, we evaluate the PRF under an active Chosen-Query threat model. We demonstrate that an adversary can circumvent the additive fracture by evaluating the PRF along a geometric sequence generated by a primitive polynomial. This structure invokes strict multiplicative homomorphism over , permitting a direct generalization of state-of-the-art table collision attacks to extract the key in operations. Finally, we establish the cryptographic boundaries of these attacks, formally proving the necessity of higher-degree key variants () to achieve exponential security against structural reduction in extension fields.

Paper Structure

This paper contains 18 sections, 7 theorems, 18 equations.

Key Result

proposition 1

Let $M$ be the total number of sequential queries. If $M \geq p^r$, the input sequence $X_n \pmod{p^r}$ silently wraps, rendering the resulting PRF keystream perfectly periodic with a maximum period of $p^r$. $\blacktriangleleft$$\blacktriangleleft$

Theorems & Definitions (13)

  • definition 1: Base-$p$ Polynomial Encoding
  • proposition 1: Periodicity Constraint
  • lemma 1: Hasse-Weil Bound for Extension Fields
  • theorem 1: Statistical Indistinguishability
  • lemma 2: Asynchronous Polynomial Carry
  • proof
  • definition 2: Differential Signature
  • theorem 2: Passive Key Recovery
  • proof
  • lemma 3: Factoring Identity of the Legendre PRF
  • ...and 3 more