Feistel Ciphers Based on a Single Primitive∗

被引:0
|
作者
Tsuji, Kento [1 ]
Iwata, Tetsu [1 ]
机构
[1] Nagoya Univ, Dept Informat & Commun Engn, Nagoya 4648603, Japan
关键词
feistel cipher; tweakable block cipher; ideal cipher; provable; security; EVEN-MANSOUR CIPHER; KEY; INDIFFERENTIABILITY; SECURITY; PERMUTATIONS;
D O I
10.1587/transfun.2024EAP1006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We consider Feistel ciphers instantiated with tweakable block ciphers (TBCs) and ideal ciphers (ICs). The indistinguishability security of the TBC-based Feistel cipher is known, and the indifferentiability security of the IC-based Feistel cipher is also known, where independently keyed TBCs and independent ICs are assumed. In this paper, we analyze the security of a single-keyed TBC-based Feistel cipher and a single IC-based Feistel cipher. We characterize the security depending on the number of rounds. More precisely, we cover the case of contracting Feistel ciphers that have d >= 2 lines, and the results on Feistel ciphers are obtained as a special case by setting d = 2 . Our indistinguishability security analysis shows that it is provably secure with d + 1 rounds. Our indifferentiability result shows that, regardless of the number of rounds, it cannot be secure. Our attacks are a type of a slide attack, and we consider a structure that uses a round constant, which is a well-known countermeasure against slide attacks. We show an indifferentiability attack for the case d = 2 and 3 rounds.
引用
收藏
页码:1229 / 1240
页数:12
相关论文
共 50 条
  • [31] Towards the optimality of Feistel ciphers with substitution-permutation functions
    Shibutani, Kyoji
    Bogdanov, Andrey
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (02) : 667 - 682
  • [32] PROPERTIES OF FEISTEL'S CIPHERS RELATIVE TO TWO WREATH PRODUCTS
    Pudovkina, M. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 58 - 61
  • [33] Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK
    Zhang, Yingjie
    Lyu, Lijun
    Qiao, Kexin
    Zhang, Zhiyu
    Sun, Siwei
    Hu, Lei
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 147 - 167
  • [34] Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP
    Lallemand, Virginie
    Minier, Marine
    Rouquette, Loic
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 113 - 140
  • [35] Towards the optimality of Feistel ciphers with substitution-permutation functions
    Kyoji Shibutani
    Andrey Bogdanov
    Designs, Codes and Cryptography, 2014, 73 : 667 - 682
  • [36] Security evaluation against differential and linear cryptanalyses for Feistel ciphers
    Nianping Wang
    Chenhui Jin
    Frontiers of Computer Science in China, 2009, 3 : 494 - 502
  • [37] On the strength of simply-iterated Feistel ciphers with whitening keys
    Onions, P
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 63 - 69
  • [38] Security evaluation against differential and linear cryptanalyses for Feistel ciphers
    Wang, Nianping
    Jin, Chenhui
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2009, 3 (04): : 494 - 502
  • [39] On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
    Guo, Chun
    Lin, Dongdai
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 110 - 133
  • [40] SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers
    Bagheri N.
    Sadeghi S.
    Ravi P.
    Bhasin S.
    Soleimany H.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (03): : 367 - 390