The Security of Feistel Ciphers with Six Rounds or Less

被引:0
|
作者
机构
[1] Department of Mathematics,
[2] Technical University of Denmark,undefined
[3] Building 303,undefined
[4] DK-2800 Kgs. Lyngby,undefined
[5] Denmark lars@ramkilde.com,undefined
[6] www.ramkilde.com,undefined
来源
Journal of Cryptology | 2002年 / 15卷
关键词
Key words. Feistel ciphers, Luby—Rackoff permutations, Cryptanalysis, Data Encryption Standard.;
D O I
暂无
中图分类号
学科分类号
摘要
This paper considers the security of Feistel networks where the round functions are chosen at random from a family of 2k randomly chosen functions for any k . Also considered are the networks where the round functions are themselves permutations, since these have applications in practice. The constructions are attacked under the assumption that a key-recovery attack on one round function itself requires an exhaustive search over all 2k possible functions. Attacks are given on all three-, four-, five-, and six-round Feistel constructions and interesting bounds on their security level are obtained. In a chosen text scenario the key recovery attacks on the four-round constructions, the analogue to the super pseudorandom permutations in the Luby and Rackoff model, take roughly only the time of an exhaustive search for the key of one round. A side result of the presented attacks is that some constructions, which have been proved super pseudorandom in the model of Luby and Rackoff, do not seem to offer more security in our model than constructions which are not super pseudorandom.
引用
收藏
页码:207 / 222
页数:15
相关论文
共 50 条
  • [21] On the security of Feistel ciphers with SPN round function against differential, linear, and truncated differential cryptanalysis
    Kanda, M
    Matsumoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01) : 25 - 37
  • [22] Full round impossible differentials for Feistel ciphers
    Zakharov, D.
    Pudovkina, M.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (02) : 295 - 300
  • [23] Quantum attacks on some feistel block ciphers
    Dong, Xiaoyang
    Dong, Bingyou
    Wang, Xiaoyun
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (06) : 1179 - 1203
  • [24] Full round impossible differentials for Feistel ciphers
    D. Zakharov
    M. Pudovkina
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 295 - 300
  • [25] Feistel ciphers in East Germany in the communist era
    Courtois, Nicolas
    Drobick, Joerg
    Schmeh, Klaus
    CRYPTOLOGIA, 2018, 42 (05) : 427 - 444
  • [26] Quantum attacks on some feistel block ciphers
    Xiaoyang Dong
    Bingyou Dong
    Xiaoyun Wang
    Designs, Codes and Cryptography, 2020, 88 : 1179 - 1203
  • [27] Feistel ciphers with L2-decorrelation
    Vaudenay, S
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 1 - 14
  • [28] Tweaking Key-Alternating Feistel Block Ciphers
    Yan, Hailun
    Wang, Lei
    Shen, Yaobin
    Lai, Xuejia
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 69 - 88
  • [29] Swarm intelligence algorithms in cryptanalysis of simple Feistel ciphers
    Mekhaznia T.
    Zidani A.
    Mekhaznia, Tahar (t.mekhaznia@univ-tebessa.dz), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (13) : 114 - 138
  • [30] Generalized Feistel Ciphers for Efficient Prime Field Masking
    Grassi, Lorenzo
    Masure, Loic
    Meaux, Pierrick
    Moos, Thorben
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY, PT III, EUROCRYPT 2024, 2024, 14653 : 188 - 220