Construction and Analysis of Cryptographic Functions