This paper presents generic structural cryptanalysis against type-I generalized Feistel networks (GFN), in which all the inner transformations are unknown. The target of our attack is to retrieve all the unknown round functions. We provide an improved yoyo game distinguisher, in which one rejects a large group of start guesses by a single wrong guess, hence is quite advantageous for reducing the complexity. Next, we exploit this distinguisher to develop a recovery attack of such structure and find the look-up tables of the first, eighth, and ninth round functions. Then by the encryption and decryption similarity, we recover the LUTs of the second, third, and tenth round functions from the decrypt direction. Finally, we retrieve the rest rounds by using the analytic relationships between the plaintexts and their four-round encryption results. Our complete recovery requires time complexity O(2(3.36n)) and memory O(2(n)), where n is the branch size. For 64-bit block cipher, our result will approximate a real-life attack. This paper is the first recovery attack against ten-round type-I GFN.
机构:
Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
Hunan Engn Res Ctr Commercial Cryptog Theory & Te, Changsha 410073, Peoples R ChinaNatl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
Zhang, Yi
Liu, Guoqiang
论文数: 0引用数: 0
h-index: 0
机构:
Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
Hunan Engn Res Ctr Commercial Cryptog Theory & Te, Changsha 410073, Peoples R ChinaNatl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
Liu, Guoqiang
Shen, Xuan
论文数: 0引用数: 0
h-index: 0
机构:
Natl Univ Def Technol, Coll Informat & Commun, Wuhan 430010, Peoples R ChinaNatl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
Shen, Xuan
LI, Chao
论文数: 0引用数: 0
h-index: 0
机构:
Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
Hunan Engn Res Ctr Commercial Cryptog Theory & Te, Changsha 410073, Peoples R ChinaNatl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
机构:
College of Liberal Arts and Sciences, National University of Defense Technology
Hunan Engineering Research Center of Commercial Cryptography Theory and Technology InnovationCollege of Liberal Arts and Sciences, National University of Defense Technology
ZHANG Yi
LIU Guoqiang
论文数: 0引用数: 0
h-index: 0
机构:
College of Liberal Arts and Sciences, National University of Defense Technology
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
Hunan Engineering Research Center of Commercial Cryptography Theory and Technology InnovationCollege of Liberal Arts and Sciences, National University of Defense Technology
LIU Guoqiang
SHEN Xuan
论文数: 0引用数: 0
h-index: 0
机构:
College of Information and Communication, National University of Defense TechnologyCollege of Liberal Arts and Sciences, National University of Defense Technology
SHEN Xuan
LI Chao
论文数: 0引用数: 0
h-index: 0
机构:
College of Liberal Arts and Sciences, National University of Defense Technology
Hunan Engineering Research Center of Commercial Cryptography Theory and Technology InnovationCollege of Liberal Arts and Sciences, National University of Defense Technology
机构:
Ecole Natl Super Mines, F-42023 St Etienne, France
Ctr Microelect Provence Gardanne France, Gardanne, FranceEcole Natl Super Mines, F-42023 St Etienne, France
Le Bouder, Helene
Thomas, Gael
论文数: 0引用数: 0
h-index: 0
机构:
CNRS, XLIM, UMR 7252, F-87060 Limoges, FranceEcole Natl Super Mines, F-42023 St Etienne, France
Thomas, Gael
Linge, Yanis
论文数: 0引用数: 0
h-index: 0
机构:
STMicroelect Rousset France, Rousset, FranceEcole Natl Super Mines, F-42023 St Etienne, France
Linge, Yanis
Tria, Assia
论文数: 0引用数: 0
h-index: 0
机构:
Ctr Microelect Provence Gardanne France, Gardanne, France
CEA Tech, Metz, FranceEcole Natl Super Mines, F-42023 St Etienne, France
Tria, Assia
2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014),
2014,
: 83
-
93