Package com.google.crypto.tink.prf
Interface Prf
-
- All Known Implementing Classes:
LegacyFullPrf,PrfAesCmac,PrfAesCmac,PrfAesCmacConscrypt,PrfHmacJce,PrfImpl
@Immutable public interface PrfThe Prf interface is an abstraction for an element of a pseudo random function family, selected by a key.It has the following properties:
- It is deterministic:
compute(byte[], int)will always return the same output if the same key is used.compute(input, length1)will be a prefix ofcompute(input, length2)iflength1 < length2and the same key is used. - It is indistinguishable from a random function: Given the evaluation of n different inputs, an attacker cannot distinguish between the PRF and random bytes on an input different from the n that are known.
Use cases for PRF are deterministic redaction of PII, keyed hash functions, creating sub IDs that do not allow joining with the original dataset without knowing the key. While PRFs can be used in order to prove authenticity of a message, using the MAC interface is recommended for that use case, as it has support for verification, avoiding the security problems that often happen during verification. It also allows for non-deterministic MAC algorithms.
-
-
Method Summary
All Methods Instance Methods Abstract Methods Modifier and Type Method Description byte[]compute(byte[] input, int outputLength)Computes the PRF selected by the underlying key on input and returns the first outputLength bytes.
-
-
-
Method Detail
-
compute
byte[] compute(byte[] input, int outputLength) throws java.security.GeneralSecurityExceptionComputes the PRF selected by the underlying key on input and returns the first outputLength bytes.- Parameters:
input- the input to compute the PRF on.outputLength- the desired length of the output in bytes. When choosing this parameter keep the birthday paradox in mind. If you have 2^n different inputs that your system has to handle set the output length to ceil(n/4 + 4) This corresponds to 2*n + 32 bits, meaning a collision will occur with a probability less than 1:2^32. When in doubt, request a security review.- Throws:
java.security.GeneralSecurityException- if the algorithm fails or if the output of algorithm is less than outputLength.
-
-