Meet-in-the-Middle Attacks on Generic Feistel Constructions

被引:0
|
作者
Guo, Jian [1 ]
Jean, Jeremy [1 ]
Nikolic, Ivica [1 ]
Sasaki, Yu [2 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] NTT Secure Platform Labs, Tokyo, Japan
关键词
Feistel; generic attack; key recovery; meet-in-the-middle; PREIMAGES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on the meet-in-the-middle technique and exploits truncated differentials that are present in the ciphers due to the Feistel construction. Depending on the type of round function, we differentiate and show attacks on two types of Feistels. For the first type, which is the most general Feistel, we show a 5-round distinguisher (based on a truncated differential), which allows to launch 6-round and 10-round attacks, for single-key and double-key sizes, respectively. For the second type, we assume the round function follows the SPN structure with a linear layer P that has a maximal branch number, and based on a 7-round distinguisher, we show attacks that reach up to 14 rounds. Our attacks outperform all the known attacks for any key sizes, have been experimentally verified (implemented on a regular PC), and provide new lower bounds on the number of rounds required to achieve a practical and a secure Feistel.
引用
收藏
页码:458 / 477
页数:20
相关论文
共 50 条
  • [31] Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA
    Bai, Dongxia
    Yu, Hongbo
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 155 - 168
  • [32] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya Liu
    Liang Cheng
    Zhiqiang Liu
    Wei Li
    Qingju Wang
    Dawu Gu
    Science China Information Sciences, 2018, 61
  • [33] Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
    Dong, Xiaoyang
    Guo, Jian
    Li, Shun
    Pham, Phuong
    Zhang, Tianyu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 158 - 187
  • [34] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Patrick Derbez
    Léo Perrin
    Journal of Cryptology, 2020, 33 : 1184 - 1215
  • [35] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 190 - 216
  • [36] Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
    Nobuyuki, Sugio
    IET INFORMATION SECURITY, 2023, 2023 (01)
  • [37] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 121 - 130
  • [38] Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
    Bao, Zhenzhen
    Ding, Lin
    Guo, Jian
    Wang, Haoyang
    Zhang, Wenying
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 318 - 347
  • [39] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 378 - 396
  • [40] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
    Abdelkhalek, Ahmed
    AlTawy, Riham
    Tolba, Mohamed
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203