The Security of Feistel Ciphers with Six Rounds or Less

被引:0
|
作者
机构
[1] Department of Mathematics,
[2] Technical University of Denmark,undefined
[3] Building 303,undefined
[4] DK-2800 Kgs. Lyngby,undefined
[5] Denmark lars@ramkilde.com,undefined
[6] www.ramkilde.com,undefined
来源
Journal of Cryptology | 2002年 / 15卷
关键词
Key words. Feistel ciphers, Luby—Rackoff permutations, Cryptanalysis, Data Encryption Standard.;
D O I
暂无
中图分类号
学科分类号
摘要
This paper considers the security of Feistel networks where the round functions are chosen at random from a family of 2k randomly chosen functions for any k . Also considered are the networks where the round functions are themselves permutations, since these have applications in practice. The constructions are attacked under the assumption that a key-recovery attack on one round function itself requires an exhaustive search over all 2k possible functions. Attacks are given on all three-, four-, five-, and six-round Feistel constructions and interesting bounds on their security level are obtained. In a chosen text scenario the key recovery attacks on the four-round constructions, the analogue to the super pseudorandom permutations in the Luby and Rackoff model, take roughly only the time of an exhaustive search for the key of one round. A side result of the presented attacks is that some constructions, which have been proved super pseudorandom in the model of Luby and Rackoff, do not seem to offer more security in our model than constructions which are not super pseudorandom.
引用
收藏
页码:207 / 222
页数:15
相关论文
共 50 条
  • [1] The security of Feistel ciphers with six rounds or less
    Knudsen, LR
    JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 207 - 222
  • [2] Security analysis for a class of generalized Feistel ciphers
    Wang, Nian-Ping
    Dalian Haishi Daxue Xuebao/Journal of Dalian Maritime University, 2007, 33 (03): : 63 - 67
  • [3] On Feistel ciphers using optimal diffusion mappings across multiple rounds
    Shirai, T
    Preneel, B
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 1 - 15
  • [4] Further security evaluation for a class of generalized Feistel ciphers
    Wang, J.-K. (jiankangwang@163.com), 1944, Chinese Institute of Electronics (41):
  • [5] Security Analysis of Key-Alternating Feistel Ciphers
    Lampe, Rodolphe
    Seurin, Yannick
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 243 - 264
  • [6] Security of random Feistel schemes with 5 or more rounds
    Patarin, J
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 106 - 122
  • [7] Security evaluation against differential and linear cryptanalyses for Feistel ciphers
    Nianping Wang
    Chenhui Jin
    Frontiers of Computer Science in China, 2009, 3 : 494 - 502
  • [8] Security evaluation against differential and linear cryptanalyses for Feistel ciphers
    Wang, Nianping
    Jin, Chenhui
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2009, 3 (04): : 494 - 502
  • [9] Complementing Feistel Ciphers
    Biryukov, Alex
    Nikolic, Ivica
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 3 - 18
  • [10] Improved Feistel-based ciphers for wireless sensor network security
    Pazynyuk, Tamara
    Li, Jian-zhong
    Oreku, George S.
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2008, 9 (08): : 1111 - 1117