Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions

被引:0
|
作者
Wei, Yuechuan [1 ]
Li, Ping [2 ]
Sun, Bing [2 ]
Li, Chao [1 ,2 ,3 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha 410073, Hunan, Peoples R China
[2] Natl Univ Def Technol, Coll Sci, Changsha 410073, Hunan, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Security, Beijing 100049, Peoples R China
来源
关键词
Block cipher; Feistel cipher; Impossible differential; CAMELLIA; ATTACKS; MISTY1;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Impossible differential cryptanalysis is well known to be effective in analyzing the security of block ciphers. Known result shows that there always exists 5-round impossible differentials of a Feistel cipher with bijective round function. However, if more details of the round function are known, the result could be improved. This paper mainly studies the impossible differentials of Feistel ciphers with both SP and SPS round functions where the linear transformation P is defined over F-2(nxn). For Feistel ciphers with SP round functions, any column of P circle plus P-1 whose Hamming weight is greater than 1 corresponds to some 6-round impossible differentials. The existence of some 7-round impossible differentials can be determined by counting the times that 1 appears at some special positions of P and P-1. Some 8-round impossible differentials can be found by computing the rank of some sub-matrix of P. Impossible differentials of Camellia found by these techniques are well consistent with previously known results. For Feistel ciphers with SPS round functions, by determining the rank of some sub-matrix of P, 6-round impossible differentials can be found, which improves the results on E2 by one round. These results tell that when designing a Feistel cipher with SP or SPS round function where the diffusion layer is selected from F-2(nxn), the linear transformation should be chosen carefully to make the cipher secure against impossible differential cryptanalysis.
引用
收藏
页码:105 / +
页数:3
相关论文
共 50 条
  • [21] Best truncated and impossible differentials of Feistel block ciphers with S-D (Substitution and Diffusion) or D-S round functions
    Sugita, M
    Kobara, K
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (01): : 2 - 12
  • [22] Multiple impossible differential cryptanalysis of reduced-round NBC
    Liang, Lifang
    Du, Xiaoni
    CRYPTOLOGIA, 2024,
  • [23] A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis
    Kai ZHANG
    Xuejia LAI
    Lei WANG
    Jie GUAN
    Bin HU
    Science China(Information Sciences), 2023, 66 (03) : 297 - 298
  • [24] A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis
    Kai Zhang
    Xuejia Lai
    Lei Wang
    Jie Guan
    Bin Hu
    Science China Information Sciences, 2023, 66
  • [25] Impossible Differential Cryptanalysis of 16/18-Round Khudra
    Karakoc, Ferhat
    Sagdicoglu, Oznur Mut
    Gonen, Mehmet Emin
    Ersoy, Oguzhan
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, 2017, 10098 : 33 - 44
  • [26] Impossible differential cryptanalysis of reduced-round ARIA and Camellia
    Wu, Wen-Ling
    Zhang, Wen-Tao
    Feng, Deng-Guo
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (03) : 449 - 456
  • [27] Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
    吴文玲
    张文涛
    冯登国
    Journal of Computer Science & Technology, 2007, (03) : 449 - 456
  • [28] New Impossible Differential Cryptanalysis of Reduced-Round Camellia
    Li, Leibo
    Chen, Jiazhe
    Jia, Keting
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 26 - +
  • [29] A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis
    Zhang, Kai
    Lai, Xuejia
    Wang, Lei
    Guan, Jie
    Hu, Bin
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (03)
  • [30] Impossible Differential Cryptanalysis of reduced-round TEA and XTEA
    Hajari, Masroor
    Azimi, Seyyed Arash
    Aghdaie, Poorya
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 58 - 63