Meet-in-the-Middle Attacks on Generic Feistel Constructions

被引:0
|
作者
Guo, Jian [1 ]
Jean, Jeremy [1 ]
Nikolic, Ivica [1 ]
Sasaki, Yu [2 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] NTT Secure Platform Labs, Tokyo, Japan
关键词
Feistel; generic attack; key recovery; meet-in-the-middle; PREIMAGES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on the meet-in-the-middle technique and exploits truncated differentials that are present in the ciphers due to the Feistel construction. Depending on the type of round function, we differentiate and show attacks on two types of Feistels. For the first type, which is the most general Feistel, we show a 5-round distinguisher (based on a truncated differential), which allows to launch 6-round and 10-round attacks, for single-key and double-key sizes, respectively. For the second type, we assume the round function follows the SPN structure with a linear layer P that has a maximal branch number, and based on a 7-round distinguisher, we show attacks that reach up to 14 rounds. Our attacks outperform all the known attacks for any key sizes, have been experimentally verified (implemented on a regular PC), and provide new lower bounds on the number of rounds required to achieve a practical and a secure Feistel.
引用
收藏
页码:458 / 477
页数:20
相关论文
共 50 条
  • [41] Meet-in-the-middle attacks on 10-round AES-256
    Li, Rongjia
    Jin, Chenhui
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 459 - 471
  • [42] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    JOURNAL OF CRYPTOLOGY, 2020, 33 (03) : 1184 - 1215
  • [43] Meet-in-the-middle attacks on 10-round AES-256
    Rongjia Li
    Chenhui Jin
    Designs, Codes and Cryptography, 2016, 80 : 459 - 471
  • [44] Differential Meet-In-The-Middle Cryptanalysis
    Boura, Christina
    David, Nicolas
    Derbez, Patrick
    Leander, Gregor
    Naya-Plasencia, Maria
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 240 - 272
  • [45] Meet-in-the-middle Cryptanalysis of IVLBC
    Uchiyama, Yuki
    Igarashi, Yasutaka
    2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 445 - 450
  • [46] Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
    Bao, Zhenzhen
    Dong, Xiaoyang
    Guo, Jian
    Li, Zheng
    Shi, Danping
    Sun, Siwei
    Wang, Xiaoyun
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 771 - 804
  • [47] Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
    Sasaki, Yu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 79 - 94
  • [48] Improved meet-in-the-middle attacks on reduced-round Joltik-BC
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2021, 15 (03) : 247 - 255
  • [49] Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search
    Ma, Zhangjun
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2023, 17 (03) : 534 - 543
  • [50] Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
    Zhang, Zhiyu
    Sun, Siwei
    Wang, Caibing
    Hu, Lei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (02) : 224 - 252