Pdf Construction And Analysis Of Cryptographic Functions