Feistel Ciphers Based on a Single Primitive∗

被引:0
|
作者
Tsuji, Kento [1 ]
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Dept Informat & Commun Engn, Nagoya 4648603, Japan
关键词
feistel cipher; tweakable block cipher; ideal cipher; provable; security; EVEN-MANSOUR CIPHER; KEY; INDIFFERENTIABILITY; SECURITY; PERMUTATIONS;
D O I
10.1587/transfun.2024EAP1006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We consider Feistel ciphers instantiated with tweakable block ciphers (TBCs) and ideal ciphers (ICs). The indistinguishability security of the TBC-based Feistel cipher is known, and the indifferentiability security of the IC-based Feistel cipher is also known, where independently keyed TBCs and independent ICs are assumed. In this paper, we analyze the security of a single-keyed TBC-based Feistel cipher and a single IC-based Feistel cipher. We characterize the security depending on the number of rounds. More precisely, we cover the case of contracting Feistel ciphers that have d >= 2 lines, and the results on Feistel ciphers are obtained as a special case by setting d = 2 . Our indistinguishability security analysis shows that it is provably secure with d + 1 rounds. Our indifferentiability result shows that, regardless of the number of rounds, it cannot be secure. Our attacks are a type of a slide attack, and we consider a structure that uses a round constant, which is a well-known countermeasure against slide attacks. We show an indifferentiability attack for the case d = 2 and 3 rounds.
引用
收藏
页码:1229 / 1240
页数:12
相关论文
共 50 条
  • [21] Tweaking Key-Alternating Feistel Block Ciphers
    Yan, Hailun
    Wang, Lei
    Shen, Yaobin
    Lai, Xuejia
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 69 - 88
  • [22] Swarm intelligence algorithms in cryptanalysis of simple Feistel ciphers
    Mekhaznia T.
    Zidani A.
    Mekhaznia, Tahar (t.mekhaznia@univ-tebessa.dz), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (13) : 114 - 138
  • [23] Generalized Feistel Ciphers for Efficient Prime Field Masking
    Grassi, Lorenzo
    Masure, Loic
    Meaux, Pierrick
    Moos, Thorben
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY, PT III, EUROCRYPT 2024, 2024, 14653 : 188 - 220
  • [24] On Lai-Massey and quasi-Feistel ciphers
    Yun, Aaram
    Park, Je Hong
    Lee, Jooyoung
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 58 (01) : 45 - 72
  • [25] A related key attack on the feistel type block ciphers
    Computer Engineering Department, Sharif University of Technology, P. O. Box 11155-8639, Azadi Avenue, 14588 Tehran, Iran
    不详
    Int. J. Netw. Secur., 2009, 3 (221-226): : 221 - 226
  • [26] Further security evaluation for a class of generalized Feistel ciphers
    Wang, J.-K. (jiankangwang@163.com), 1944, Chinese Institute of Electronics (41):
  • [27] Security Analysis of Key-Alternating Feistel Ciphers
    Lampe, Rodolphe
    Seurin, Yannick
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 243 - 264
  • [28] POSTER: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers
    Ozdemir, Betul Askin
    Beyne, Tim
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3621 - 3623
  • [29] Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
    Laskari, E. C.
    Meletiou, G. C.
    Stamatiou, Y. C.
    Vrahatis, M. N.
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 184 (01) : 63 - 72
  • [30] Improved Feistel-based ciphers for wireless sensor network security附视频
    Tamara PAZYNYUK
    George S. OREKU
    Journal of Zhejiang University(Science A:An International Applied Physics & Engineering Journal), 2008, (08) : 1111 - 1117